CVE-2025-21666
31.01.2025, 12:15
In the Linux kernel, the following vulnerability has been resolved: vsock: prevent null-ptr-deref in vsock_*[has_data|has_space] Recent reports have shown how we sometimes call vsock_*_has_data() when a vsock socket has been de-assigned from a transport (see attached links), but we shouldn't. Previous commits should have solved the real problems, but we may have more in the future, so to avoid null-ptr-deref, we can return 0 (no space, no data available) but with a warning. This way the code should continue to run in a nearly consistent state and have a warning that allows us to debug future problems.Enginsight
Vendor | Product | Version |
---|---|---|
linux | linux_kernel | 5.5 ≤ 𝑥 < 5.15.177 |
linux | linux_kernel | 5.16 ≤ 𝑥 < 6.1.127 |
linux | linux_kernel | 6.2 ≤ 𝑥 < 6.6.74 |
linux | linux_kernel | 6.7 ≤ 𝑥 < 6.12.11 |
linux | linux_kernel | 6.13:rc1 |
linux | linux_kernel | 6.13:rc2 |
linux | linux_kernel | 6.13:rc3 |
linux | linux_kernel | 6.13:rc4 |
linux | linux_kernel | 6.13:rc5 |
linux | linux_kernel | 6.13:rc6 |
linux | linux_kernel | 6.13:rc7 |
𝑥
= Vulnerable software versions

Debian Releases
Common Weakness Enumeration
Vulnerability Media Exposure
References