CVE-2025-21669
31.01.2025, 12:15
In the Linux kernel, the following vulnerability has been resolved: vsock/virtio: discard packets if the transport changes If the socket has been de-assigned or assigned to another transport, we must discard any packets received because they are not expected and would cause issues when we access vsk->transport. A possible scenario is described by Hyunwoo Kim in the attached link, where after a first connect() interrupted by a signal, and a second connect() failed, we can find `vsk->transport` at NULL, leading to a NULL pointer dereference.Enginsight
Vendor | Product | Version |
---|---|---|
linux | linux_kernel | 5.5 ≤ 𝑥 < 5.15.177 |
linux | linux_kernel | 5.16 ≤ 𝑥 < 6.1.127 |
linux | linux_kernel | 6.2 ≤ 𝑥 < 6.6.74 |
linux | linux_kernel | 6.7 ≤ 𝑥 < 6.12.11 |
linux | linux_kernel | 6.13:rc1 |
linux | linux_kernel | 6.13:rc2 |
linux | linux_kernel | 6.13:rc3 |
linux | linux_kernel | 6.13:rc4 |
linux | linux_kernel | 6.13:rc5 |
linux | linux_kernel | 6.13:rc6 |
linux | linux_kernel | 6.13:rc7 |
𝑥
= Vulnerable software versions

Debian Releases
Common Weakness Enumeration
Vulnerability Media Exposure
References