{"uuid": "65401956-612a-49eb-85d7-0e3e9e1331b5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-21666", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/3653", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-21666\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: In the Linux kernel, the following vulnerability has been resolved:\n\nvsock: prevent null-ptr-deref in vsock_*[has_data|has_space]\n\nRecent reports have shown how we sometimes call vsock_*_has_data()\nwhen a vsock socket has been de-assigned from a transport (see attached\nlinks), but we shouldn't.\n\nPrevious commits should have solved the real problems, but we may have\nmore in the future, so to avoid null-ptr-deref, we can return 0\n(no space, no data available) but with a warning.\n\nThis way the code should continue to run in a nearly consistent state\nand have a warning that allows us to debug future problems.\n\ud83d\udccf Published: 2025-01-31T12:33:02Z\n\ud83d\udccf Modified: 2025-01-31T12:33:02Z\n\ud83d\udd17 References:\n1. https://nvd.nist.gov/vuln/detail/CVE-2025-21666\n2. https://git.kernel.org/stable/c/91751e248256efc111e52e15115840c35d85abaf\n3. https://git.kernel.org/stable/c/9e5fed46ccd2c34c5fa5a9c8825ce4823fdc853e\n4. https://git.kernel.org/stable/c/b52e50dd4fabd12944172bd486a4f4853b7f74dd\n5. https://git.kernel.org/stable/c/bc9c49341f9728c31fe248c5fbba32d2e81a092b\n6. https://git.kernel.org/stable/c/c23d1d4f8efefb72258e9cedce29de10d057f8ca", "creation_timestamp": "2025-01-31T13:15:04.000000Z"}