Home

Description

In the Linux kernel, the following vulnerability has been resolved: listmount: don't call path_put() under namespace semaphore Massage listmount() and make sure we don't call path_put() under the namespace semaphore. If we put the last reference we're fscked.

PUBLISHED Reserved 2025-04-16 | Published 2025-11-12 | Updated 2025-12-01 | Assigner Linux

Product status

Default status
unaffected

b4c2bea8ceaa50cd42a8f73667389d801a3ecf2d (git) before 659874b7ee4976ad9ce476e07fd36bc67b3537f1
affected

b4c2bea8ceaa50cd42a8f73667389d801a3ecf2d (git) before 9c80da26fda2fdcaac7f92b5908875b3108830ff
affected

b4c2bea8ceaa50cd42a8f73667389d801a3ecf2d (git) before c1f86d0ac322c7e77f6f8dbd216c65d39358ffc0
affected

Default status
affected

6.8
affected

Any version before 6.8
unaffected

6.12.54 (semver)
unaffected

6.17.4 (semver)
unaffected

6.18 (original_commit_for_fix)
unaffected

References

git.kernel.org/...c/659874b7ee4976ad9ce476e07fd36bc67b3537f1

git.kernel.org/...c/9c80da26fda2fdcaac7f92b5908875b3108830ff

git.kernel.org/...c/c1f86d0ac322c7e77f6f8dbd216c65d39358ffc0

cve.org (CVE-2025-40203)

nvd.nist.gov (CVE-2025-40203)

Download JSON