Home

Description

In the Linux kernel, the following vulnerability has been resolved: vsock/virtio: Validate length in packet header before skb_put() When receiving a vsock packet in the guest, only the virtqueue buffer size is validated prior to virtio_vsock_skb_rx_put(). Unfortunately, virtio_vsock_skb_rx_put() uses the length from the packet header as the length argument to skb_put(), potentially resulting in SKB overflow if the host has gone wonky. Validate the length as advertised by the packet header before calling virtio_vsock_skb_rx_put().

PUBLISHED Reserved 2025-04-16 | Published 2025-09-05 | Updated 2025-09-29 | Assigner Linux

Product status

Default status
unaffected

baddcc2c71572968cdaeee1c4ab3dc0ad90fa765 (git) before 969b06bd8b7560efb100a34227619e7d318fbe05
affected

71dc9ec9ac7d3eee785cdc986c3daeb821381e20 (git) before ee438c492b2e0705d819ac0e25d04fae758d8f8f
affected

71dc9ec9ac7d3eee785cdc986c3daeb821381e20 (git) before faf332a10372390ce65d0b803888f4b25a388335
affected

71dc9ec9ac7d3eee785cdc986c3daeb821381e20 (git) before 676f03760ca1d69c2470cef36c44dc152494b47c
affected

71dc9ec9ac7d3eee785cdc986c3daeb821381e20 (git) before 0dab92484474587b82e8e0455839eaf5ac7bf894
affected

Default status
affected

6.3
affected

Any version before 6.3
unaffected

6.1.149 (semver)
unaffected

6.6.103 (semver)
unaffected

6.12.44 (semver)
unaffected

6.16.4 (semver)
unaffected

6.17 (original_commit_for_fix)
unaffected

References

git.kernel.org/...c/969b06bd8b7560efb100a34227619e7d318fbe05

git.kernel.org/...c/ee438c492b2e0705d819ac0e25d04fae758d8f8f

git.kernel.org/...c/faf332a10372390ce65d0b803888f4b25a388335

git.kernel.org/...c/676f03760ca1d69c2470cef36c44dc152494b47c

git.kernel.org/...c/0dab92484474587b82e8e0455839eaf5ac7bf894

cve.org (CVE-2025-39718)

nvd.nist.gov (CVE-2025-39718)

Download JSON