Fixed
Created: Dec 10, 2025
Updated: Dec 11, 2025
Resolved Date: Dec 10, 2025
Found In Version: 10.22.33.1
Fix Version: 10.22.33.3
Severity: Standard
Applicable for: Wind River Linux LTS 22
Component/s: Kernel
In the Linux kernel, the following vulnerability has been resolved:[EOL][EOL]net: rds: don't hold sock lock when cancelling work from rds_tcp_reset_callbacks()[EOL][EOL]syzbot is reporting lockdep warning at rds_tcp_reset_callbacks() [1], for[EOL]commit ac3615e7f3cffe2a ("RDS: TCP: Reduce code duplication in[EOL]rds_tcp_reset_callbacks()") added cancel_delayed_work_sync() into a section[EOL]protected by lock_sock() without realizing that rds_send_xmit() might call[EOL]lock_sock().[EOL][EOL]We don't need to protect cancel_delayed_work_sync() using lock_sock(), for[EOL]even if rds_{send,recv}_worker() re-queued this work while __flush_work()[EOL] from cancel_delayed_work_sync() was waiting for this work to complete,[EOL]retried rds_{send,recv}_worker() is no-op due to the absence of RDS_CONN_UP[EOL]bit.