CVE-2025-21666

Source
https://nvd.nist.gov/vuln/detail/CVE-2025-21666
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-21666.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2025-21666
Downstream
Related
Published
2025-01-31T12:15:27Z
Modified
2025-10-01T20:18:17Z
Severity
  • 5.5 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
[none]
Details

In the Linux kernel, the following vulnerability has been resolved:

vsock: prevent null-ptr-deref in vsock*[hasdata|has_space]

Recent reports have shown how we sometimes call vsock*has_data() when a vsock socket has been de-assigned from a transport (see attached links), but we shouldn't.

Previous commits should have solved the real problems, but we may have more in the future, so to avoid null-ptr-deref, we can return 0 (no space, no data available) but with a warning.

This way the code should continue to run in a nearly consistent state and have a warning that allows us to debug future problems.

References

Affected packages