In the Linux kernel, the following vulnerability has been resolved:
vsock: prevent null-ptr-deref in vsock_*[hasdata|hasspace]
Recent reports have shown how we sometimes call vsock_*hasdata() when a vsock socket has been de-assigned from a transport (see attached links), but we shouldn't.
Previous commits should have solved the real problems, but we may have more in the future, so to avoid null-ptr-deref, we can return 0 (no space, no data available) but with a warning.
This way the code should continue to run in a nearly consistent state and have a warning that allows us to debug future problems.
{
"cna_assigner": "Linux",
"osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/21xxx/CVE-2025-21666.json"
}[
{
"signature_type": "Line",
"deprecated": false,
"id": "CVE-2025-21666-50783b09",
"target": {
"file": "net/vmw_vsock/af_vsock.c"
},
"digest": {
"threshold": 0.9,
"line_hashes": [
"108537343070897196491939357969924052287",
"219544903924714015283193098649942645194",
"220036159885546337357750522596612193410",
"135599186596389849067884391407207732660",
"212456964666857365482945530957761497064",
"54147384121960577038970272052598350994",
"231747496091312138784112211416952369489",
"65585572287803123538157571937803217270",
"302303224355861565559186072029530735708",
"269175991236061443366114574685023241359",
"148263024296509174525456907731875002582"
]
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@bc9c49341f9728c31fe248c5fbba32d2e81a092b"
},
{
"signature_type": "Function",
"deprecated": false,
"id": "CVE-2025-21666-9afa4b82",
"target": {
"file": "net/vmw_vsock/af_vsock.c",
"function": "vsock_stream_has_data"
},
"digest": {
"length": 93.0,
"function_hash": "149776090751625789771979985530763130440"
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@bc9c49341f9728c31fe248c5fbba32d2e81a092b"
},
{
"signature_type": "Function",
"deprecated": false,
"id": "CVE-2025-21666-a22d2e27",
"target": {
"file": "net/vmw_vsock/af_vsock.c",
"function": "vsock_connectible_has_data"
},
"digest": {
"length": 204.0,
"function_hash": "16246550881898182238836618780166846388"
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@bc9c49341f9728c31fe248c5fbba32d2e81a092b"
},
{
"signature_type": "Function",
"deprecated": false,
"id": "CVE-2025-21666-bca20af7",
"target": {
"file": "net/vmw_vsock/af_vsock.c",
"function": "vsock_stream_has_space"
},
"digest": {
"length": 94.0,
"function_hash": "195405411828109698325017726757026141280"
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@bc9c49341f9728c31fe248c5fbba32d2e81a092b"
}
]
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-21666.json"