CVE-2025-39718

Source
https://nvd.nist.gov/vuln/detail/CVE-2025-39718
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-39718.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2025-39718
Downstream
Related
Published
2025-09-05T18:15:49Z
Modified
2025-09-22T22:01:12Z
Summary
[none]
Details

In the Linux kernel, the following vulnerability has been resolved:

vsock/virtio: Validate length in packet header before skb_put()

When receiving a vsock packet in the guest, only the virtqueue buffer size is validated prior to virtiovsockskbrxput(). Unfortunately, virtiovsockskbrxput() uses the length from the packet header as the length argument to skb_put(), potentially resulting in SKB overflow if the host has gone wonky.

Validate the length as advertised by the packet header before calling virtiovsockskbrxput().

References

Affected packages