CVE-2025-40248
BaseFortify
Publication date: 2025-12-04
Last updated on: 2025-12-06
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability occurs in the Linux kernel's vsock implementation during the connect() operation. If a signal or timeout causes the system to disconnect an already established socket, it leads to several issues: race conditions between canceling packets and sending messages that cause incorrect tracking of unsent bytes, resetting the socket state while it is still in use which breaks assumptions in the socket map and triggers warnings, and state transitions that allow transport changes after a connection is established, potentially causing use-after-free or null pointer dereference errors. The fix is to ignore signals/timeouts on connect() if the socket is already established, avoiding disconnection in that case.
How can this vulnerability impact me? :
This vulnerability can lead to unstable socket behavior, including race conditions and incorrect socket state management. This may cause application crashes, unexpected warnings, or even memory corruption such as use-after-free or null pointer dereferences. Such issues can degrade system reliability and potentially be exploited to cause denial of service or other unintended behaviors in applications relying on vsock connections.
What immediate steps should I take to mitigate this vulnerability?
The vulnerability is resolved by ensuring that during connect(), the socket is not disconnected on signal/timeout if it is already established. Immediate mitigation involves updating the Linux kernel to a version that includes this fix, which prevents the disconnect and related race conditions. Avoid using kernel versions vulnerable to this issue.