CVE-2025-40203

Source
https://nvd.nist.gov/vuln/detail/CVE-2025-40203
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-40203.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-40203
Downstream
Published
2025-11-12T21:56:34.801Z
Modified
2025-11-28T02:34:25.580940Z
Summary
listmount: don't call path_put() under namespace semaphore
Details

In the Linux kernel, the following vulnerability has been resolved:

listmount: don't call path_put() under namespace semaphore

Massage listmount() and make sure we don't call path_put() under the namespace semaphore. If we put the last reference we're fscked.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/40xxx/CVE-2025-40203.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
b4c2bea8ceaa50cd42a8f73667389d801a3ecf2d
Fixed
659874b7ee4976ad9ce476e07fd36bc67b3537f1
Fixed
9c80da26fda2fdcaac7f92b5908875b3108830ff
Fixed
c1f86d0ac322c7e77f6f8dbd216c65d39358ffc0

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
6.8.0
Fixed
6.12.54
Type
ECOSYSTEM
Events
Introduced
6.13.0
Fixed
6.17.4