Description
In the Linux kernel, the following vulnerability has been resolved: vsock: prevent null-ptr-deref in vsock_*[has_data|has_space] Recent reports have shown how we sometimes call vsock_*_has_data() when a vsock socket has been de-assigned from a transport (see attached links), but we shouldn't. Previous commits should have solved the real problems, but we may have more in the future, so to avoid null-ptr-deref, we can return 0 (no space, no data available) but with a warning. This way the code should continue to run in a nearly consistent state and have a warning that allows us to debug future problems.
INFO
Published Date :
2025-01-31T11:25:31.138Z
Last Modified :
2025-11-03T20:58:44.611Z
Source :
Linux
AFFECTED PRODUCTS
The following products are affected by CVE-2025-21666 vulnerability.
| Vendors | Products |
|---|---|
| Linux |
|
| Redhat |
|
REFERENCES
Here, you will find a curated list of external links that provide in-depth information to CVE-2025-21666.