CVE-2025-39718

Severity CVSS v4.0:
Pending analysis
Type:
CWE-787 Out-of-bounds Write
Publication date:
05/09/2025
Last modified:
07/01/2026

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> vsock/virtio: Validate length in packet header before skb_put()<br /> <br /> When receiving a vsock packet in the guest, only the virtqueue buffer<br /> size is validated prior to virtio_vsock_skb_rx_put(). Unfortunately,<br /> virtio_vsock_skb_rx_put() uses the length from the packet header as the<br /> length argument to skb_put(), potentially resulting in SKB overflow if<br /> the host has gone wonky.<br /> <br /> Validate the length as advertised by the packet header before calling<br /> virtio_vsock_skb_rx_put().

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.1.63 (including) 6.1.149 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.3 (including) 6.6.103 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.7 (including) 6.12.44 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.13 (including) 6.16.4 (excluding)
cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*