In the Linux kernel, the following vulnerability has been resolved:
net: kcm: Fix race condition in kcm_unattach()
syzbot found a race condition when kcm_unattach(psock)
and kcm_release(kcm) are executed at the same time.
kcm_unattach() is missing a check of the flag
kcm->tx_stopped before calling queue_work().
If the kcm has a reserved psock, kcm_unattach() might get executed
between cancel_work_sync() and unreserve_psock() in kcm_release(),
requeuing kcm->tx_work right before kcm gets freed in kcm_done().
Remove kcm->tx_stopped and replace it by the less
error-prone disable_work_sync().
CVSS
No CVSS.
References
Configurations
No configuration.
History
04 Sep 2025, 16:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-09-04 16:15
Updated : 2025-09-05 17:47
NVD link : CVE-2025-38717
Mitre link : CVE-2025-38717
CVE.ORG link : CVE-2025-38717
JSON object : View
Products Affected
No product.
CWE
No CWE.