๐Ÿ” CVE Alert

CVE-2025-40248

UNKNOWN 0.0

vsock: Ignore signal/timeout on connect() if already established

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: vsock: Ignore signal/timeout on connect() if already established During connect(), acting on a signal/timeout by disconnecting an already established socket leads to several issues: 1. connect() invoking vsock_transport_cancel_pkt() -> virtio_transport_purge_skbs() may race with sendmsg() invoking virtio_transport_get_credit(). This results in a permanently elevated `vvs->bytes_unsent`. Which, in turn, confuses the SOCK_LINGER handling. 2. connect() resetting a connected socket's state may race with socket being placed in a sockmap. A disconnected socket remaining in a sockmap breaks sockmap's assumptions. And gives rise to WARNs. 3. connect() transitioning SS_CONNECTED -> SS_UNCONNECTED allows for a transport change/drop after TCP_ESTABLISHED. Which poses a problem for any simultaneous sendmsg() or connect() and may result in a use-after-free/null-ptr-deref. Do not disconnect socket on signal/timeout. Keep the logic for unconnected sockets: they don't linger, can't be placed in a sockmap, are rejected by sendmsg(). [1]: https://lore.kernel.org/netdev/[email protected]/ [2]: https://lore.kernel.org/netdev/[email protected]/ [3]: https://lore.kernel.org/netdev/[email protected]/

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Dec 4, 2025
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
d021c344051af91f42c5ba9fdedc176740cbd238 < 3f71753935d648082a8279a97d30efe6b85be680 d021c344051af91f42c5ba9fdedc176740cbd238 < da664101fb4a0de5cb70d2bae6a650df954df2af d021c344051af91f42c5ba9fdedc176740cbd238 < 67432915145848658149683101104e32f9fd6559 d021c344051af91f42c5ba9fdedc176740cbd238 < eeca93f06df89be5a36305b7b9dae1ed65550dfc d021c344051af91f42c5ba9fdedc176740cbd238 < 5998da5a8208ae9ad7838ba322bccb2bdcd95e81 d021c344051af91f42c5ba9fdedc176740cbd238 < f1c170cae285e4b8f61be043bb17addc3d0a14b5 d021c344051af91f42c5ba9fdedc176740cbd238 < ab6b19f690d89ae4709fba73a3c4a7911f495b7a d021c344051af91f42c5ba9fdedc176740cbd238 < 002541ef650b742a198e4be363881439bb9d86b4
Linux / Linux
3.9

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/3f71753935d648082a8279a97d30efe6b85be680 git.kernel.org: https://git.kernel.org/stable/c/da664101fb4a0de5cb70d2bae6a650df954df2af git.kernel.org: https://git.kernel.org/stable/c/67432915145848658149683101104e32f9fd6559 git.kernel.org: https://git.kernel.org/stable/c/eeca93f06df89be5a36305b7b9dae1ed65550dfc git.kernel.org: https://git.kernel.org/stable/c/5998da5a8208ae9ad7838ba322bccb2bdcd95e81 git.kernel.org: https://git.kernel.org/stable/c/f1c170cae285e4b8f61be043bb17addc3d0a14b5 git.kernel.org: https://git.kernel.org/stable/c/ab6b19f690d89ae4709fba73a3c4a7911f495b7a git.kernel.org: https://git.kernel.org/stable/c/002541ef650b742a198e4be363881439bb9d86b4