๐Ÿ” CVE Alert

CVE-2025-38185

UNKNOWN 0.0

atm: atmtcp: Free invalid length skb in atmtcp_c_send().

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: atm: atmtcp: Free invalid length skb in atmtcp_c_send(). syzbot reported the splat below. [0] vcc_sendmsg() copies data passed from userspace to skb and passes it to vcc->dev->ops->send(). atmtcp_c_send() accesses skb->data as struct atmtcp_hdr after checking if skb->len is 0, but it's not enough. Also, when skb->len == 0, skb and sk (vcc) were leaked because dev_kfree_skb() is not called and sk_wmem_alloc adjustment is missing to revert atm_account_tx() in vcc_sendmsg(), which is expected to be done in atm_pop_raw(). Let's properly free skb with an invalid length in atmtcp_c_send(). [0]: BUG: KMSAN: uninit-value in atmtcp_c_send+0x255/0xed0 drivers/atm/atmtcp.c:294 atmtcp_c_send+0x255/0xed0 drivers/atm/atmtcp.c:294 vcc_sendmsg+0xd7c/0xff0 net/atm/common.c:644 sock_sendmsg_nosec net/socket.c:712 [inline] __sock_sendmsg+0x330/0x3d0 net/socket.c:727 ____sys_sendmsg+0x7e0/0xd80 net/socket.c:2566 ___sys_sendmsg+0x271/0x3b0 net/socket.c:2620 __sys_sendmsg net/socket.c:2652 [inline] __do_sys_sendmsg net/socket.c:2657 [inline] __se_sys_sendmsg net/socket.c:2655 [inline] __x64_sys_sendmsg+0x211/0x3e0 net/socket.c:2655 x64_sys_call+0x32fb/0x3db0 arch/x86/include/generated/asm/syscalls_64.h:47 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0xd9/0x210 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f Uninit was created at: slab_post_alloc_hook mm/slub.c:4154 [inline] slab_alloc_node mm/slub.c:4197 [inline] kmem_cache_alloc_node_noprof+0x818/0xf00 mm/slub.c:4249 kmalloc_reserve+0x13c/0x4b0 net/core/skbuff.c:579 __alloc_skb+0x347/0x7d0 net/core/skbuff.c:670 alloc_skb include/linux/skbuff.h:1336 [inline] vcc_sendmsg+0xb40/0xff0 net/atm/common.c:628 sock_sendmsg_nosec net/socket.c:712 [inline] __sock_sendmsg+0x330/0x3d0 net/socket.c:727 ____sys_sendmsg+0x7e0/0xd80 net/socket.c:2566 ___sys_sendmsg+0x271/0x3b0 net/socket.c:2620 __sys_sendmsg net/socket.c:2652 [inline] __do_sys_sendmsg net/socket.c:2657 [inline] __se_sys_sendmsg net/socket.c:2655 [inline] __x64_sys_sendmsg+0x211/0x3e0 net/socket.c:2655 x64_sys_call+0x32fb/0x3db0 arch/x86/include/generated/asm/syscalls_64.h:47 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0xd9/0x210 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f CPU: 1 UID: 0 PID: 5798 Comm: syz-executor192 Not tainted 6.16.0-rc1-syzkaller-00010-g2c4a1f3fe03e #0 PREEMPT(undef) Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Jul 4, 2025
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < c19c0943424b412a84fdf178e6c71fe5480e4f0f 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < a4b0fd8c25a7583f8564af6cc910418fb8954e89 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < 1b0ad18704913c92a3ad53748fbc0f219a75b876 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < ca00f0e6d733ecd9150716d1fd0138d26e674706 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < 3261c017a7c5d2815c6a388c5a3280d1fba0e8db 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < e996507f59610e5752b8702537f13f551e7a2c96 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < c9260c837de1d2b454960a4a2e44a81272fbcd22 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < 2f370ae1fb6317985f3497b1bb80d457508ca2f7
Linux / Linux
2.6.12

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/c19c0943424b412a84fdf178e6c71fe5480e4f0f git.kernel.org: https://git.kernel.org/stable/c/a4b0fd8c25a7583f8564af6cc910418fb8954e89 git.kernel.org: https://git.kernel.org/stable/c/1b0ad18704913c92a3ad53748fbc0f219a75b876 git.kernel.org: https://git.kernel.org/stable/c/ca00f0e6d733ecd9150716d1fd0138d26e674706 git.kernel.org: https://git.kernel.org/stable/c/3261c017a7c5d2815c6a388c5a3280d1fba0e8db git.kernel.org: https://git.kernel.org/stable/c/e996507f59610e5752b8702537f13f551e7a2c96 git.kernel.org: https://git.kernel.org/stable/c/c9260c837de1d2b454960a4a2e44a81272fbcd22 git.kernel.org: https://git.kernel.org/stable/c/2f370ae1fb6317985f3497b1bb80d457508ca2f7 lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html