Null Pointer Dereference Vulnerability in Linux Kernel vsock Related Functions
CVE-2025-21670
Summary
A vulnerability in the Linux kernel's vsock handling can cause a null pointer dereference error due to the absence of an assigned transport. If a socket is in a state where the transport is not set, such as after a connection failure, it may lead to unsafe kernel operations. This flaw can be triggered in various situations, particularly during socket message retrieval, and poses a risk of system instability and unexpected behaviors. To mitigate this risk, it is crucial to ensure checks on the transport layer are properly implemented.
Affected Version(s)
Linux 634f1a7110b439c65fd8a809171c1d2d28bcea6f < 58e586c30d0b6f5dc0174a41026f2b0a48c9aab6
Linux 634f1a7110b439c65fd8a809171c1d2d28bcea6f < 6771e1279dadf1d92a72e1465134257d9e6f2459
Linux 634f1a7110b439c65fd8a809171c1d2d28bcea6f
References
Timeline
Vulnerability published
Vulnerability Reserved