CVE-2025-40331Time-of-check Time-of-use (TOCTOU) Race Condition in Linux

Severity
7.8HIGHOSV
OSV3.2
No vector
EPSS
0.1%
top 79.04%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedDec 9
Latest updateApr 13

Description

In the Linux kernel, the following vulnerability has been resolved: sctp: Prevent TOCTOU out-of-bounds write For the following path not holding the sock lock, sctp_diag_dump() -> sctp_for_each_endpoint() -> sctp_ep_dump() make sure not to exceed bounds in case the address list has grown between buffer allocation (time-of-check) and write (time-of-use).

Affected Packages7 packages

Linuxlinux/linux_kernel4.7.05.4.302+6
Debianlinux/linux_kernel< 5.10.247-1+3
Ubuntulinux/linux_kernel< 5.15.0-173.183+2
CVEListV5linux/linux8f840e47f190cbe61a96945c13e9551048d42cefb106a68df0650b694b254427cd9250c04500edd3+8

🔴Vulnerability Details

23
OSV
linux-raspi vulnerabilities2026-04-01
OSV
linux-raspi, linux-raspi-realtime vulnerabilities2026-04-01
OSV
linux-azure-6.8 vulnerabilities2026-03-25
OSV
linux-azure vulnerabilities2026-03-25
OSV
linux-intel-iot-realtime vulnerabilities2026-03-23

📋Vendor Advisories

25
Ubuntu
Linux kernel (Azure) vulnerabilities2026-04-13
Ubuntu
Linux kernel (Azure FIPS) vulnerabilities2026-04-09
Ubuntu
Linux kernel (Azure FIPS) vulnerabilities2026-04-09
Ubuntu
Linux kernel (Raspberry Pi) vulnerabilities2026-04-01
Ubuntu
Linux kernel (Raspberry Pi) vulnerabilities2026-04-01

🕵️Threat Intelligence

1
Wiz
CVE-2025-40331 Impact, Exploitability, and Mitigation Steps | Wiz
CVE-2025-40331 — Linux vulnerability | cvebase