In the Linux kernel, the following vulnerability has been resolved:
vsock/virtio: Validate length in packet header before skb_put()
When receiving a vsock packet in the guest, only the virtqueue buffer size is validated prior to virtiovsockskbrxput(). Unfortunately, virtiovsockskbrxput() uses the length from the packet header as the length argument to skb_put(), potentially resulting in SKB overflow if the host has gone wonky.
Validate the length as advertised by the packet header before calling virtiovsockskbrxput().
[
{
"signature_version": "v1",
"id": "CVE-2025-39718-42382ffa",
"digest": {
"threshold": 0.9,
"line_hashes": [
"153616620504240647557692912230317861495",
"67135776993953806900214865405319135725",
"169198164953757336322572361470928518300",
"334836193422365978672605980627768735299",
"2514897796649071312155595012349516102",
"240811156156852771565417182065987430614",
"206990953319871290076867821515224105031",
"312272449528151666730977399451380108810",
"105905311806394642376257025542072754123",
"325451111847988714126157455733714602434",
"276182046737888991063648740205188200210",
"137661168800799274031713370308061460226",
"136899906014439121395213856770089845289",
"153666316125775034707540540496584221012"
]
},
"deprecated": false,
"target": {
"file": "net/vmw_vsock/virtio_transport.c"
},
"signature_type": "Line",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@0dab92484474587b82e8e0455839eaf5ac7bf894"
},
{
"signature_version": "v1",
"id": "CVE-2025-39718-78631549",
"digest": {
"function_hash": "252009816519200385015420213897813094979",
"length": 777.0
},
"deprecated": false,
"target": {
"file": "net/vmw_vsock/virtio_transport.c",
"function": "virtio_transport_rx_work"
},
"signature_type": "Function",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@faf332a10372390ce65d0b803888f4b25a388335"
},
{
"signature_version": "v1",
"id": "CVE-2025-39718-f14948cb",
"digest": {
"function_hash": "252009816519200385015420213897813094979",
"length": 777.0
},
"deprecated": false,
"target": {
"file": "net/vmw_vsock/virtio_transport.c",
"function": "virtio_transport_rx_work"
},
"signature_type": "Function",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@0dab92484474587b82e8e0455839eaf5ac7bf894"
},
{
"signature_version": "v1",
"id": "CVE-2025-39718-f514aa80",
"digest": {
"threshold": 0.9,
"line_hashes": [
"153616620504240647557692912230317861495",
"67135776993953806900214865405319135725",
"169198164953757336322572361470928518300",
"334836193422365978672605980627768735299",
"2514897796649071312155595012349516102",
"240811156156852771565417182065987430614",
"206990953319871290076867821515224105031",
"312272449528151666730977399451380108810",
"105905311806394642376257025542072754123",
"325451111847988714126157455733714602434",
"276182046737888991063648740205188200210",
"137661168800799274031713370308061460226",
"136899906014439121395213856770089845289",
"153666316125775034707540540496584221012"
]
},
"deprecated": false,
"target": {
"file": "net/vmw_vsock/virtio_transport.c"
},
"signature_type": "Line",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@faf332a10372390ce65d0b803888f4b25a388335"
}
]