In the Linux kernel, the following vulnerability has been resolved: vsock/virtio: Validate length in packet header before skbput() When receiving a vsock packet in the guest, only the virtqueue buffer size is validated prior to virtiovsockskbrxput(). Unfortunately, virtiovsockskbrxput() uses the length from the packet header as the length argument to skbput(), potentially resulting in SKB overflow if the host has gone wonky. Validate the length as advertised by the packet header before calling virtiovsockskbrxput().