Bug 2418872 (CVE-2025-40248) - CVE-2025-40248 kernel: Linux kernel: vsock vulnerability may lead to memory corruption
Summary: CVE-2025-40248 kernel: Linux kernel: vsock vulnerability may lead to memory c...
Keywords:
Status: NEW
Alias: CVE-2025-40248
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
high
high
Target Milestone: ---
Assignee: Product Security DevOps Team
QA Contact:
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2025-12-04 17:02 UTC by OSIDB Bzimport
Modified: 2026-01-29 13:36 UTC (History)
0 users

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2026:1142 0 None None None 2026-01-26 13:31:55 UTC
Red Hat Product Errata RHSA-2026:1143 0 None None None 2026-01-26 14:20:58 UTC
Red Hat Product Errata RHSA-2026:1148 0 None None None 2026-01-26 07:44:08 UTC
Red Hat Product Errata RHSA-2026:1442 0 None None None 2026-01-28 00:32:47 UTC
Red Hat Product Errata RHSA-2026:1445 0 None None None 2026-01-28 00:27:35 UTC
Red Hat Product Errata RHSA-2026:1494 0 None None None 2026-01-28 15:08:11 UTC
Red Hat Product Errata RHSA-2026:1495 0 None None None 2026-01-28 15:04:25 UTC
Red Hat Product Errata RHSA-2026:1512 0 None None None 2026-01-28 19:15:03 UTC
Red Hat Product Errata RHSA-2026:1581 0 None None None 2026-01-29 13:36:40 UTC

Description OSIDB Bzimport 2025-12-04 17:02:22 UTC
In the Linux kernel, the following vulnerability has been resolved:

vsock: Ignore signal/timeout on connect() if already established

During connect(), acting on a signal/timeout by disconnecting an already
established socket leads to several issues:

1. connect() invoking vsock_transport_cancel_pkt() ->
   virtio_transport_purge_skbs() may race with sendmsg() invoking
   virtio_transport_get_credit(). This results in a permanently elevated
   `vvs->bytes_unsent`. Which, in turn, confuses the SOCK_LINGER handling.

2. connect() resetting a connected socket's state may race with socket
   being placed in a sockmap. A disconnected socket remaining in a sockmap
   breaks sockmap's assumptions. And gives rise to WARNs.

3. connect() transitioning SS_CONNECTED -> SS_UNCONNECTED allows for a
   transport change/drop after TCP_ESTABLISHED. Which poses a problem for
   any simultaneous sendmsg() or connect() and may result in a
   use-after-free/null-ptr-deref.

Do not disconnect socket on signal/timeout. Keep the logic for unconnected
sockets: they don't linger, can't be placed in a sockmap, are rejected by
sendmsg().

[1]: https://lore.kernel.org/netdev/e07fd95c-9a38-4eea-9638-133e38c2ec9b@rbox.co/
[2]: https://lore.kernel.org/netdev/20250317-vsock-trans-signal-race-v4-0-fc8837f3f1d4@rbox.co/
[3]: https://lore.kernel.org/netdev/60f1b7db-3099-4f6a-875e-af9f6ef194f6@rbox.co/

Comment 3 errata-xmlrpc 2026-01-26 07:44:08 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2026:1148 https://access.redhat.com/errata/RHSA-2026:1148

Comment 4 errata-xmlrpc 2026-01-26 13:31:54 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2026:1142 https://access.redhat.com/errata/RHSA-2026:1142

Comment 5 errata-xmlrpc 2026-01-26 14:20:57 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2026:1143 https://access.redhat.com/errata/RHSA-2026:1143

Comment 6 errata-xmlrpc 2026-01-28 00:27:34 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.8 Update Services for SAP Solutions
  Red Hat Enterprise Linux 8.8 Telecommunications Update Service

Via RHSA-2026:1445 https://access.redhat.com/errata/RHSA-2026:1445

Comment 7 errata-xmlrpc 2026-01-28 00:32:46 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support
  Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions
  Red Hat Enterprise Linux 8.6 Telecommunications Update Service

Via RHSA-2026:1442 https://access.redhat.com/errata/RHSA-2026:1442

Comment 8 errata-xmlrpc 2026-01-28 15:04:25 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions

Via RHSA-2026:1495 https://access.redhat.com/errata/RHSA-2026:1495

Comment 9 errata-xmlrpc 2026-01-28 15:08:09 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions

Via RHSA-2026:1494 https://access.redhat.com/errata/RHSA-2026:1494

Comment 10 errata-xmlrpc 2026-01-28 19:15:02 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.2 Advanced Update Support

Via RHSA-2026:1512 https://access.redhat.com/errata/RHSA-2026:1512

Comment 11 errata-xmlrpc 2026-01-29 13:36:38 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7 Extended Lifecycle Support

Via RHSA-2026:1581 https://access.redhat.com/errata/RHSA-2026:1581


Note You need to log in before you can comment on or make changes to this bug.