Critical Linux Kernel Vulnerability Exposes Systems to Privilege Escalation

A significant vulnerability in the Linux kernel’s Virtual Socket (vsock) implementation, designated as CVE-2025-21756, has been identified that could allow local attackers to escalate privileges to root level. Cyber Security News is a Dedicated News Platform For Cyber News, Cyber Attack News, Hacking News & Vulnerability Analysis. Security researchers have confirmed that this flaw, which received a CVSS v3.1 Base Score of 7.8 (HIGH), can be reliably exploited on affected systems. For systems that cannot be immediately patched, limiting access to local users and monitoring for suspicious activities related to the vsock subsystem is recommended. CVE-2025-21756 represents a significant security risk for Linux systems. According to the Hoefler report, the vulnerability stems from improper handling of socket bindings during transport reassignment in the vsock subsystem. By using vsock_diag_dump() as a side channel, attackers can leak the memory address of init_net, effectively defeating Kernel Address Space Layout Randomization (KASLR). If exploited, attackers can gain root privileges, potentially leading to complete system compromise, data theft, or service disruption. This can create a scenario where subsequent calls to vsock_bind() assume the socket is in the unbound list and call __vsock_remove_bound(), leading to the use-after-free condition. This vulnerability affects all Linux distributions running vulnerable kernel versions. The issue is particularly concerning for cloud environments and virtualized systems that rely heavily on the vsock functionality for guest-host communications. Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. Specifically, the issue occurs in a sequence where the socket’s reference counter is incorrectly decremented, leading to a use-after-free condition.

This Cyber News was published on cybersecuritynews.com. Publication date: Tue, 29 Apr 2025 08:00:07 +0000


Cyber News related to Critical Linux Kernel Vulnerability Exposes Systems to Privilege Escalation

Vulnerability Summary for the Week of March 11, 2024 - Published 2024-03-15 CVSS Score not yet calculated Source & Patch Info CVE-2021-47111416baaa9-dc9f-4396-8d5f-8c081fb06d67416baaa9-dc9f-4396-8d5f-8c081fb06d67416baaa9-dc9f-4396-8d5f-8c081fb06d67 PrimaryVendor - Product linux - linux Description In the ...
1 year ago Cisa.gov
Vulnerability Summary for the Week of March 4, 2024 - Published 2024-03-06 CVSS Score not yet calculated Source & Patch Info CVE-2023-52584416baaa9-dc9f-4396-8d5f-8c081fb06d67416baaa9-dc9f-4396-8d5f-8c081fb06d67416baaa9-dc9f-4396-8d5f-8c081fb06d67416baaa9-dc9f-4396-8d5f-8c081fb06d67 PrimaryVendor - ...
1 year ago Cisa.gov
CVE-2024-36886 - In the Linux kernel, the following vulnerability has been resolved: ...
10 months ago
CVE-2024-26957 - In the Linux kernel, the following vulnerability has been resolved: ...
11 months ago
CVE-2024-26688 - In the Linux kernel, the following vulnerability has been resolved: fs,hugetlb: fix NULL pointer dereference in hugetlbs_fill_super When configuring a hugetlb filesystem via the fsconfig() syscall, there is a possible NULL dereference in ...
1 year ago Tenable.com
CVE-2022-49123 - In the Linux kernel, the following vulnerability has been resolved: ...
2 months ago
CVE-2022-48664 - In the Linux kernel, the following vulnerability has been resolved: ...
1 year ago
CVE-2024-44989 - In the Linux kernel, the following vulnerability has been resolved: ...
4 months ago
What Is a Privilege Escalation Attack? Types & Prevention - Privilege escalation is a method that threat actors use to increase their access to systems and data that they aren't authorized to see. This guide to privilege escalation attacks covers the two main types, the avenues attackers use, and detection ...
1 year ago Esecurityplanet.com LAPSUS$ Turla Whitefly
IT and OT cybersecurity: A holistic approach - In comparison, OT refers to the specialized systems that control physical processes and industrial operations. OT Technologies include industrial control systems, SCADA systems and programmable logic controllers that directly control physical ...
1 year ago Securityintelligence.com
Embedded Linux IoT Security: Defending Against Cyber Threats - Embedded Linux IoT systems are now essential parts of many different kinds of products, from industrial machinery and smart appliances to medical equipment and automobile systems. As Embedded Linux is being used widely, it has attracted the attention ...
1 year ago Securityboulevard.com
CVE-2022-49248 - In the Linux kernel, the following vulnerability has been resolved: ...
2 months ago
The Embedded Systems and The Internet of Things - The Internet of Things is a quite new concept dealing with the devices being connected to each other and communicating through the web environment. This concept is gaining its popularity amongst the embedded systems that exist - let's say - 10 or ...
1 year ago Cyberdefensemagazine.com
CVE-2024-56658 - In the Linux kernel, the following vulnerability has been resolved: net: defer final 'struct net' free in netns dismantle Ilya reported a slab-use-after-free in dst_destroy [1] Issue is in xfrm6_net_init() and xfrm4_net_init() : They copy ...
4 months ago Tenable.com
CVE-2022-48923 - In the Linux kernel, the following vulnerability has been resolved: ...
4 months ago
Openssh Flaw Exposes Millions of Linux to Arbitrary Code Attacks - A critical vulnerability has been discovered in OpenSSH, a widely used implementation of the SSH protocol, which could potentially expose millions of Linux systems to arbitrary code execution attacks. The flaw, identified in the sshd(8) component of ...
9 months ago Cybersecuritynews.com
CVE-2022-49156 - In the Linux kernel, the following vulnerability has been resolved: ...
2 months ago
Creating a New Market for Post-Quantum Cryptography - A day in the busy life of any systems integrator includes many actions that revolve around the lifeblood of its business - its customers. Systems integrators help solve evolving customer business challenges, which in turn adds partner value. It's a ...
1 year ago Securityboulevard.com
CVE-2024-50106 - In the Linux kernel, the following vulnerability has been resolved: nfsd: fix race between laundromat and free_stateid There is a race between laundromat handling of revoked delegations and a client sending free_stateid operation. Laundromat thread ...
5 months ago Tenable.com
Cybersecurity In Critical Infrastructure: Protecting Power Grids and Smart Grids - Cyber Defense Magazine - Network Intrusion: Network communication systems of power and smart grids can be intruded through weak security configurations like default password, unsecured remote access, or unpatched systems and other vulnerabilities to gain control into the ...
6 months ago Cyberdefensemagazine.com
CVE-2020-8023 - A acceptance of Extraneous Untrusted Data With Trusted Data vulnerability in the start script of openldap2 of SUSE Enterprise Storage 5, SUSE Linux Enterprise Debuginfo 11-SP3, SUSE Linux Enterprise Debuginfo 11-SP4, SUSE Linux Enterprise Point of ...
4 years ago
CVE-2024-57896 - In the Linux kernel, the following vulnerability has been resolved: btrfs: flush delalloc workers queue before stopping cleaner kthread during unmount During the unmount path, at close_ctree(), we first stop the cleaner kthread, using kthread_stop() ...
3 months ago Tenable.com
CVE-2021-47118 - In the Linux kernel, the following vulnerability has been resolved: ...
1 year ago
CVE-2021-47512 - In the Linux kernel, the following vulnerability has been resolved: ...
11 months ago
Critical Infrastructure At Risk: Vulnerabilities Discovered In Automatic Tank Gauging - Pedro Umbelino, Principal Research Scientist at Bitsight, says the vulnerabilities could allow malefactors to exploit ATG systems, leading to potentially catastrophic outcomes, including environmental hazards, economic disruption, and even physical ...
6 months ago Informationsecuritybuzz.com

Latest Cyber News


Cyber Trends (last 7 days)