In the Linux kernel, the following vulnerability has been...
Moderate severity
Unreviewed
Published
Jan 31, 2025
to the GitHub Advisory Database
•
Updated Feb 3, 2025
Description
Published by the National Vulnerability Database
Jan 31, 2025
Published to the GitHub Advisory Database
Jan 31, 2025
Last updated
Feb 3, 2025
In the Linux kernel, the following vulnerability has been resolved:
vsock: prevent null-ptr-deref in vsock_*[has_data|has_space]
Recent reports have shown how we sometimes call vsock_*_has_data()
when a vsock socket has been de-assigned from a transport (see attached
links), but we shouldn't.
Previous commits should have solved the real problems, but we may have
more in the future, so to avoid null-ptr-deref, we can return 0
(no space, no data available) but with a warning.
This way the code should continue to run in a nearly consistent state
and have a warning that allows us to debug future problems.
References