In the Linux kernel, the following vulnerability has been resolved: vsock/virtio: Validate length in packet header before skb_put() When receiving a vsock packet in the guest, only the virtqueue buffer size is validated prior to virtio_vsock_skb_rx_put(). Unfortunately, virtio_vsock_skb_rx_put() uses the length from the packet header as the length argument to skb_put(), potentially resulting in SKB overflow if the host has gone wonky. Validate the length as advertised by the packet header before calling virtio_vsock_skb_rx_put().
Upstream advisory: https://lore.kernel.org/linux-cve-announce/2025090551-CVE-2025-39718-2e2c@gregkh/T
This issue has been addressed in the following products: Red Hat Enterprise Linux 9.4 Extended Update Support Via RHSA-2025:19104 https://access.redhat.com/errata/RHSA-2025:19104
This issue has been addressed in the following products: Red Hat Enterprise Linux 10 Via RHSA-2025:19106 https://access.redhat.com/errata/RHSA-2025:19106
This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2025:19105 https://access.redhat.com/errata/RHSA-2025:19105
This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2025:21112 https://access.redhat.com/errata/RHSA-2025:21112
This issue has been addressed in the following products: Red Hat Enterprise Linux 10 Via RHSA-2025:21118 https://access.redhat.com/errata/RHSA-2025:21118
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2025:21397 https://access.redhat.com/errata/RHSA-2025:21397
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2025:21398 https://access.redhat.com/errata/RHSA-2025:21398