In the Linux kernel, the following vulnerability has been resolved:
vsock/virtio: Validate length in packet header before skb_put()
When receiving a vsock packet in the guest, only the virtqueue buffer
size is validated prior to virtio_vsock_skb_rx_put(). Unfortunately,
virtio_vsock_skb_rx_put() uses the length from the packet header as the
length argument to skb_put(), potentially resulting in SKB overflow if
the host has gone wonky.
Validate the length as advertised by the packet header before calling
virtio_vsock_skb_rx_put().
References
Configurations
History
07 Jan 2026, 19:34
| Type | Values Removed | Values Added |
|---|---|---|
| CWE | CWE-787 | |
| CPE | cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* |
|
| First Time |
Linux
Debian Debian debian Linux Linux linux Kernel |
|
| References | () https://git.kernel.org/stable/c/0dab92484474587b82e8e0455839eaf5ac7bf894 - Patch | |
| References | () https://git.kernel.org/stable/c/676f03760ca1d69c2470cef36c44dc152494b47c - Patch | |
| References | () https://git.kernel.org/stable/c/969b06bd8b7560efb100a34227619e7d318fbe05 - Patch | |
| References | () https://git.kernel.org/stable/c/ee438c492b2e0705d819ac0e25d04fae758d8f8f - Patch | |
| References | () https://git.kernel.org/stable/c/faf332a10372390ce65d0b803888f4b25a388335 - Patch | |
| References | () https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html - Third Party Advisory | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
03 Nov 2025, 18:16
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
05 Sep 2025, 18:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-09-05 18:15
Updated : 2026-01-07 19:34
NVD link : CVE-2025-39718
Mitre link : CVE-2025-39718
CVE.ORG link : CVE-2025-39718
JSON object : View
Products Affected
debian
- debian_linux
linux
- linux_kernel
CWE
CWE-787
Out-of-bounds Write
