{"id":"CVE-2025-40248","summary":"vsock: Ignore signal/timeout on connect() if already established","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nvsock: Ignore signal/timeout on connect() if already established\n\nDuring connect(), acting on a signal/timeout by disconnecting an already\nestablished socket leads to several issues:\n\n1. connect() invoking vsock_transport_cancel_pkt() -\u003e\n   virtio_transport_purge_skbs() may race with sendmsg() invoking\n   virtio_transport_get_credit(). This results in a permanently elevated\n   `vvs-\u003ebytes_unsent`. Which, in turn, confuses the SOCK_LINGER handling.\n\n2. connect() resetting a connected socket's state may race with socket\n   being placed in a sockmap. A disconnected socket remaining in a sockmap\n   breaks sockmap's assumptions. And gives rise to WARNs.\n\n3. connect() transitioning SS_CONNECTED -\u003e SS_UNCONNECTED allows for a\n   transport change/drop after TCP_ESTABLISHED. Which poses a problem for\n   any simultaneous sendmsg() or connect() and may result in a\n   use-after-free/null-ptr-deref.\n\nDo not disconnect socket on signal/timeout. Keep the logic for unconnected\nsockets: they don't linger, can't be placed in a sockmap, are rejected by\nsendmsg().\n\n[1]: https://lore.kernel.org/netdev/e07fd95c-9a38-4eea-9638-133e38c2ec9b@rbox.co/\n[2]: https://lore.kernel.org/netdev/20250317-vsock-trans-signal-race-v4-0-fc8837f3f1d4@rbox.co/\n[3]: https://lore.kernel.org/netdev/60f1b7db-3099-4f6a-875e-af9f6ef194f6@rbox.co/","modified":"2026-03-31T17:29:29.985656941Z","published":"2025-12-04T16:08:11.509Z","related":["ALSA-2026:1142","ALSA-2026:1143","ALSA-2026:1148","ALSA-2026:1690","MGASA-2026-0017","MGASA-2026-0018","SUSE-SU-2026:0278-1","SUSE-SU-2026:0281-1","SUSE-SU-2026:0315-1","SUSE-SU-2026:0316-1","SUSE-SU-2026:20207-1","SUSE-SU-2026:20220-1","SUSE-SU-2026:20228-1","SUSE-SU-2026:20477-1","SUSE-SU-2026:20498-1","SUSE-SU-2026:20845-1","SUSE-SU-2026:20876-1","openSUSE-SU-2026:20145-1"],"database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/40xxx/CVE-2025-40248.json","cna_assigner":"Linux"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/002541ef650b742a198e4be363881439bb9d86b4"},{"type":"WEB","url":"https://git.kernel.org/stable/c/3f71753935d648082a8279a97d30efe6b85be680"},{"type":"WEB","url":"https://git.kernel.org/stable/c/5998da5a8208ae9ad7838ba322bccb2bdcd95e81"},{"type":"WEB","url":"https://git.kernel.org/stable/c/67432915145848658149683101104e32f9fd6559"},{"type":"WEB","url":"https://git.kernel.org/stable/c/ab6b19f690d89ae4709fba73a3c4a7911f495b7a"},{"type":"WEB","url":"https://git.kernel.org/stable/c/da664101fb4a0de5cb70d2bae6a650df954df2af"},{"type":"WEB","url":"https://git.kernel.org/stable/c/eeca93f06df89be5a36305b7b9dae1ed65550dfc"},{"type":"WEB","url":"https://git.kernel.org/stable/c/f1c170cae285e4b8f61be043bb17addc3d0a14b5"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/40xxx/CVE-2025-40248.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-40248"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"d021c344051af91f42c5ba9fdedc176740cbd238"},{"fixed":"3f71753935d648082a8279a97d30efe6b85be680"},{"fixed":"da664101fb4a0de5cb70d2bae6a650df954df2af"},{"fixed":"67432915145848658149683101104e32f9fd6559"},{"fixed":"eeca93f06df89be5a36305b7b9dae1ed65550dfc"},{"fixed":"5998da5a8208ae9ad7838ba322bccb2bdcd95e81"},{"fixed":"f1c170cae285e4b8f61be043bb17addc3d0a14b5"},{"fixed":"ab6b19f690d89ae4709fba73a3c4a7911f495b7a"},{"fixed":"002541ef650b742a198e4be363881439bb9d86b4"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-40248.json"}},{"package":{"name":"Kernel","ecosystem":"Linux"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"3.9.0"},{"fixed":"5.4.302"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.5.0"},{"fixed":"5.10.247"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.11.0"},{"fixed":"5.15.197"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.16.0"},{"fixed":"6.1.159"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.2.0"},{"fixed":"6.6.118"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.7.0"},{"fixed":"6.12.60"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.13.0"},{"fixed":"6.17.10"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-40248.json"}}],"schema_version":"1.7.5"}