Bug 2348609 (CVE-2025-21756)
Summary: | CVE-2025-21756 kernel: vsock: Keep the binding until socket destruction | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | OSIDB Bzimport <bzimport> |
Component: | vulnerability | Assignee: | Product Security DevOps Team <prodsec-dev> |
Status: | NEW --- | QA Contact: | |
Severity: | high | Docs Contact: | |
Priority: | high | ||
Version: | unspecified | CC: | dfreiber, drow, jburrell, michael.h.hall-1, vkumar |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | If docs needed, set a value | |
Doc Text: |
A flaw was found in the Linux kernel's VMware network driver, where an improperly timed socket unbinding could result in a use-after-free issue. This flaw allows an attacker who can create and destroy arbitrary connections on virtual connections to read or modify system memory, potentially leading to an escalation of privileges or the compromise of sensitive data.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | Type: | --- | |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: |
Description
OSIDB Bzimport
2025-02-27 03:04:59 UTC
Upstream advisory: https://lore.kernel.org/linux-cve-announce/2025022603-CVE-2025-21756-5e09@gregkh/T This issue has been addressed in the following products: Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions Red Hat Enterprise Linux 8.6 Telecommunications Update Service Via RHSA-2025:7652 https://access.redhat.com/errata/RHSA-2025:7652 This issue has been addressed in the following products: Red Hat Enterprise Linux 9.2 Extended Update Support Via RHSA-2025:7676 https://access.redhat.com/errata/RHSA-2025:7676 This issue has been addressed in the following products: Red Hat Enterprise Linux 8.8 Extended Update Support Via RHSA-2025:7682 https://access.redhat.com/errata/RHSA-2025:7682 This issue has been addressed in the following products: Red Hat Enterprise Linux 9.2 Extended Update Support Via RHSA-2025:7683 https://access.redhat.com/errata/RHSA-2025:7683 This issue has been addressed in the following products: Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions Via RHSA-2025:7896 https://access.redhat.com/errata/RHSA-2025:7896 This issue has been addressed in the following products: Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support Red Hat Enterprise Linux 8.4 Telecommunications Update Service Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions Via RHSA-2025:7902 https://access.redhat.com/errata/RHSA-2025:7902 This issue has been addressed in the following products: Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support Red Hat Enterprise Linux 8.4 Telecommunications Update Service Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions Via RHSA-2025:7901 https://access.redhat.com/errata/RHSA-2025:7901 This issue has been addressed in the following products: Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions Via RHSA-2025:7897 https://access.redhat.com/errata/RHSA-2025:7897 This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2025:7903 https://access.redhat.com/errata/RHSA-2025:7903 This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2025:8056 https://access.redhat.com/errata/RHSA-2025:8056 This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2025:8057 https://access.redhat.com/errata/RHSA-2025:8057 This issue has been addressed in the following products: Red Hat Enterprise Linux 9.4 Extended Update Support Via RHSA-2025:8058 https://access.redhat.com/errata/RHSA-2025:8058 This issue has been addressed in the following products: Red Hat Enterprise Linux 10 Via RHSA-2025:8137 https://access.redhat.com/errata/RHSA-2025:8137 This issue has been addressed in the following products: Red Hat Enterprise Linux 9.4 Extended Update Support Via RHSA-2025:8248 https://access.redhat.com/errata/RHSA-2025:8248 This issue has been addressed in the following products: Red Hat Enterprise Linux 9.4 Extended Update Support Via RHSA-2025:8342 https://access.redhat.com/errata/RHSA-2025:8342 This issue has been addressed in the following products: Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions Via RHSA-2025:8344 https://access.redhat.com/errata/RHSA-2025:8344 This issue has been addressed in the following products: Red Hat Enterprise Linux 8.8 Extended Update Support Via RHSA-2025:8346 https://access.redhat.com/errata/RHSA-2025:8346 This issue has been addressed in the following products: Red Hat Enterprise Linux 9.2 Extended Update Support Via RHSA-2025:8343 https://access.redhat.com/errata/RHSA-2025:8343 This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2025:8345 https://access.redhat.com/errata/RHSA-2025:8345 This issue has been addressed in the following products: Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions Via RHSA-2025:8348 https://access.redhat.com/errata/RHSA-2025:8348 This issue has been addressed in the following products: Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions Via RHSA-2025:8347 https://access.redhat.com/errata/RHSA-2025:8347 |