Acknowledged
Created: Sep 7, 2025
Updated: Sep 8, 2025
Found In Version: 10.24.33.1
Severity: Standard
Applicable for: Wind River Linux LTS 24
Component/s: Kernel
In the Linux kernel, the following vulnerability has been resolved:EOL][EOL]vsock/virtio: Validate length in packet header before skb_put()[EOL][EOL]When receiving a vsock packet in the guest, only the virtqueue buffer[EOL]size is validated prior to virtio_vsock_skb_rx_put(). Unfortunately,[EOL]virtio_vsock_skb_rx_put() uses the length from the packet header as the[EOL]length argument to skb_put(), potentially resulting in SKB overflow if[EOL]the host has gone wonky.[EOL][EOL]Validate the length as advertised by the packet header before calling[EOL]virtio_vsock_skb_rx_put().
CREATE(Triage):(User=admin) [CVE-2025-39718 (https://nvd.nist.gov/vuln/detail/CVE-2025-39718)