CVE-2025-39718

Source
https://cve.org/CVERecord?id=CVE-2025-39718
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-39718.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-39718
Downstream
Related
Published
2025-09-05T17:21:25.959Z
Modified
2026-03-12T02:16:17.761649Z
Summary
vsock/virtio: Validate length in packet header before skb_put()
Details

In the Linux kernel, the following vulnerability has been resolved:

vsock/virtio: Validate length in packet header before skb_put()

When receiving a vsock packet in the guest, only the virtqueue buffer size is validated prior to virtiovsockskbrxput(). Unfortunately, virtiovsockskbrxput() uses the length from the packet header as the length argument to skb_put(), potentially resulting in SKB overflow if the host has gone wonky.

Validate the length as advertised by the packet header before calling virtiovsockskbrxput().

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/39xxx/CVE-2025-39718.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
baddcc2c71572968cdaeee1c4ab3dc0ad90fa765
Fixed
969b06bd8b7560efb100a34227619e7d318fbe05
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
71dc9ec9ac7d3eee785cdc986c3daeb821381e20
Fixed
ee438c492b2e0705d819ac0e25d04fae758d8f8f
Fixed
faf332a10372390ce65d0b803888f4b25a388335
Fixed
676f03760ca1d69c2470cef36c44dc152494b47c
Fixed
0dab92484474587b82e8e0455839eaf5ac7bf894

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-39718.json"