vulnerability

Ubuntu: (Multiple Advisories) (CVE-2025-21670): Linux kernel vulnerabilities

Severity
5
CVSS
(AV:L/AC:L/Au:S/C:N/I:N/A:C)
Published
Jan 31, 2025
Added
Apr 24, 2025
Modified
Aug 18, 2025

Description

In the Linux kernel, the following vulnerability has been resolved:

vsock/bpf: return early if transport is not assigned

Some of the core functions can only be called if the transport
has been assigned.

As Michal reported, a socket might have the transport at NULL,
for example after a failed connect(), causing the following trace:

BUG: kernel NULL pointer dereference, address: 00000000000000a0
#PF: supervisor read access in kernel mode
#PF: error_code(0x0000) - not-present page
PGD 12faf8067 P4D 12faf8067 PUD 113670067 PMD 0
Oops: Oops: 0000 [#1] PREEMPT SMP NOPTI
CPU: 15 UID: 0 PID: 1198 Comm: a.out Not tainted 6.13.0-rc2+
RIP: 0010:vsock_connectible_has_data+0x1f/0x40
Call Trace:
vsock_bpf_recvmsg+0xca/0x5e0
sock_recvmsg+0xb9/0xc0
__sys_recvfrom+0xb3/0x130
__x64_sys_recvfrom+0x20/0x30
do_syscall_64+0x93/0x180
entry_SYSCALL_64_after_hwframe+0x76/0x7e

So we need to check the `vsk->transport` in vsock_bpf_recvmsg(),
especially for connected sockets (stream/seqpacket) as we already
do in __vsock_connectible_recvmsg().

Solutions

ubuntu-upgrade-linux-image-6-11-0-1008-realtimeubuntu-upgrade-linux-image-6-11-0-1011-raspiubuntu-upgrade-linux-image-6-11-0-1012-awsubuntu-upgrade-linux-image-6-11-0-1012-lowlatencyubuntu-upgrade-linux-image-6-11-0-1012-lowlatency-64kubuntu-upgrade-linux-image-6-11-0-1013-azureubuntu-upgrade-linux-image-6-11-0-1013-azure-fdeubuntu-upgrade-linux-image-6-11-0-1013-gcpubuntu-upgrade-linux-image-6-11-0-1013-gcp-64kubuntu-upgrade-linux-image-6-11-0-1014-oracleubuntu-upgrade-linux-image-6-11-0-1014-oracle-64kubuntu-upgrade-linux-image-6-11-0-1020-oemubuntu-upgrade-linux-image-6-11-0-24-genericubuntu-upgrade-linux-image-6-11-0-24-generic-64kubuntu-upgrade-linux-image-6-8-0-1013-gkeopubuntu-upgrade-linux-image-6-8-0-1018-azure-nvidiaubuntu-upgrade-linux-image-6-8-0-1026-gkeubuntu-upgrade-linux-image-6-8-0-1027-ibmubuntu-upgrade-linux-image-6-8-0-1027-oracleubuntu-upgrade-linux-image-6-8-0-1027-oracle-64kubuntu-upgrade-linux-image-6-8-0-1029-nvidiaubuntu-upgrade-linux-image-6-8-0-1029-nvidia-64kubuntu-upgrade-linux-image-6-8-0-1029-nvidia-lowlatencyubuntu-upgrade-linux-image-6-8-0-1029-nvidia-lowlatency-64kubuntu-upgrade-linux-image-6-8-0-1029-oemubuntu-upgrade-linux-image-6-8-0-1029-raspiubuntu-upgrade-linux-image-6-8-0-1030-awsubuntu-upgrade-linux-image-6-8-0-1030-aws-64kubuntu-upgrade-linux-image-6-8-0-1030-azureubuntu-upgrade-linux-image-6-8-0-1030-azure-fdeubuntu-upgrade-linux-image-6-8-0-1031-gcpubuntu-upgrade-linux-image-6-8-0-1031-gcp-64kubuntu-upgrade-linux-image-6-8-0-2024-raspi-realtimeubuntu-upgrade-linux-image-6-8-0-62-genericubuntu-upgrade-linux-image-6-8-0-62-generic-64kubuntu-upgrade-linux-image-6-8-0-62-lowlatencyubuntu-upgrade-linux-image-6-8-0-62-lowlatency-64kubuntu-upgrade-linux-image-6-8-0-64-genericubuntu-upgrade-linux-image-6-8-0-64-generic-64kubuntu-upgrade-linux-image-6-8-1-1023-realtimeubuntu-upgrade-linux-image-awsubuntu-upgrade-linux-image-aws-64kubuntu-upgrade-linux-image-aws-64k-lts-24-04ubuntu-upgrade-linux-image-aws-lts-24-04ubuntu-upgrade-linux-image-azureubuntu-upgrade-linux-image-azure-fdeubuntu-upgrade-linux-image-azure-fde-lts-24-04ubuntu-upgrade-linux-image-azure-lts-24-04ubuntu-upgrade-linux-image-azure-nvidiaubuntu-upgrade-linux-image-gcpubuntu-upgrade-linux-image-gcp-64kubuntu-upgrade-linux-image-gcp-64k-lts-24-04ubuntu-upgrade-linux-image-gcp-lts-24-04ubuntu-upgrade-linux-image-genericubuntu-upgrade-linux-image-generic-6-8ubuntu-upgrade-linux-image-generic-64kubuntu-upgrade-linux-image-generic-64k-6-8ubuntu-upgrade-linux-image-generic-64k-hwe-22-04ubuntu-upgrade-linux-image-generic-64k-hwe-24-04ubuntu-upgrade-linux-image-generic-hwe-22-04ubuntu-upgrade-linux-image-generic-hwe-24-04ubuntu-upgrade-linux-image-generic-lpaeubuntu-upgrade-linux-image-gkeubuntu-upgrade-linux-image-gkeopubuntu-upgrade-linux-image-gkeop-6-8ubuntu-upgrade-linux-image-ibmubuntu-upgrade-linux-image-ibm-classicubuntu-upgrade-linux-image-ibm-lts-24-04ubuntu-upgrade-linux-image-kvmubuntu-upgrade-linux-image-lowlatencyubuntu-upgrade-linux-image-lowlatency-64kubuntu-upgrade-linux-image-lowlatency-64k-hwe-22-04ubuntu-upgrade-linux-image-lowlatency-64k-hwe-24-04ubuntu-upgrade-linux-image-lowlatency-hwe-22-04ubuntu-upgrade-linux-image-lowlatency-hwe-24-04ubuntu-upgrade-linux-image-nvidiaubuntu-upgrade-linux-image-nvidia-6-8ubuntu-upgrade-linux-image-nvidia-64kubuntu-upgrade-linux-image-nvidia-64k-6-8ubuntu-upgrade-linux-image-nvidia-64k-hwe-22-04ubuntu-upgrade-linux-image-nvidia-hwe-22-04ubuntu-upgrade-linux-image-nvidia-lowlatencyubuntu-upgrade-linux-image-nvidia-lowlatency-64kubuntu-upgrade-linux-image-oem-22-04ubuntu-upgrade-linux-image-oem-22-04aubuntu-upgrade-linux-image-oem-22-04bubuntu-upgrade-linux-image-oem-22-04cubuntu-upgrade-linux-image-oem-22-04dubuntu-upgrade-linux-image-oem-24-04ubuntu-upgrade-linux-image-oem-24-04aubuntu-upgrade-linux-image-oem-24-04bubuntu-upgrade-linux-image-oracleubuntu-upgrade-linux-image-oracle-64kubuntu-upgrade-linux-image-oracle-64k-lts-24-04ubuntu-upgrade-linux-image-oracle-lts-24-04ubuntu-upgrade-linux-image-raspiubuntu-upgrade-linux-image-raspi-realtimeubuntu-upgrade-linux-image-realtimeubuntu-upgrade-linux-image-virtualubuntu-upgrade-linux-image-virtual-6-8ubuntu-upgrade-linux-image-virtual-hwe-22-04ubuntu-upgrade-linux-image-virtual-hwe-24-04

References

    Title
    NEW

    Explore Exposure Command

    Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.