Acknowledged
Created: Aug 24, 2025
Updated: Aug 26, 2025
Found In Version: 10.24.33.1
Severity: Standard
Applicable for: Wind River Linux LTS 24
Component/s: Kernel
In the Linux kernel, the following vulnerability has been resolved:EOL][EOL]vsock: Do not allow binding to VMADDR_PORT_ANY[EOL][EOL]It is possible for a vsock to autobind to VMADDR_PORT_ANY. This can[EOL]cause a use-after-free when a connection is made to the bound socket.[EOL]The socket returned by accept() also has port VMADDR_PORT_ANY but is not[EOL]on the list of unbound sockets. Binding it will result in an extra[EOL]refcount decrement similar to the one fixed in fcdd2242c023 (vsock: Keep[EOL]the binding until socket destruction).[EOL][EOL]Modify the check in __vsock_bind_connectible() to also prevent binding[EOL]to VMADDR_PORT_ANY.
CREATE(Triage):(User=pbi-cn) [CVE-2025-38618 (https://nvd.nist.gov/vuln/detail/CVE-2025-38618)