vulnerability

Red Hat: CVE-2025-39718: kernel: vsock/virtio: Validate length in packet header before skb_put() (Multiple Advisories)

Severity
7
CVSS
(AV:A/AC:L/Au:N/C:P/I:P/A:C)
Published
Sep 5, 2025
Added
Oct 28, 2025
Modified
Nov 18, 2025

Description

In the Linux kernel, the following vulnerability has been resolved:

vsock/virtio: Validate length in packet header before skb_put()

When receiving a vsock packet in the guest, only the virtqueue buffer
size is validated prior to virtio_vsock_skb_rx_put(). Unfortunately,
virtio_vsock_skb_rx_put() uses the length from the packet header as the
length argument to skb_put(), potentially resulting in SKB overflow if
the host has gone wonky.

Validate the length as advertised by the packet header before calling
virtio_vsock_skb_rx_put().

Solutions

redhat-upgrade-kernelredhat-upgrade-kernel-rt
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.