๐Ÿ” CVE Alert

CVE-2025-38190

UNKNOWN 0.0

atm: Revert atm_account_tx() if copy_from_iter_full() fails.

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: atm: Revert atm_account_tx() if copy_from_iter_full() fails. In vcc_sendmsg(), we account skb->truesize to sk->sk_wmem_alloc by atm_account_tx(). It is expected to be reverted by atm_pop_raw() later called by vcc->dev->ops->send(vcc, skb). However, vcc_sendmsg() misses the same revert when copy_from_iter_full() fails, and then we will leak a socket. Let's factorise the revert part as atm_return_tx() and call it in the failure path. Note that the corresponding sk_wmem_alloc operation can be found in alloc_tx() as of the blamed commit. $ git blame -L:alloc_tx net/atm/common.c c55fa3cccbc2c~

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Jul 4, 2025
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < 5e0d00992118e234ebf29d5145c1cc920342777e 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < c12430edd92fd49a4800b0f3fb395b50cb16bcc1 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < 287b4f085d2ca3375cf1ee672af27410c64777e8 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < 2252c539c43f9a1431a7e8b34e3c18e9dd77a96d 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < 3902205eadf35db59dbc2186c2a98b9e6182efa5 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < 3d828519bd69bfcaabdd942a872679617ef06739 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < 7d6bc28cfe5c8e3a279b4b4bdeed6698b2702685 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < 7851263998d4269125fd6cb3fdbfc7c6db853859
Linux / Linux
2.6.12

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/5e0d00992118e234ebf29d5145c1cc920342777e git.kernel.org: https://git.kernel.org/stable/c/c12430edd92fd49a4800b0f3fb395b50cb16bcc1 git.kernel.org: https://git.kernel.org/stable/c/287b4f085d2ca3375cf1ee672af27410c64777e8 git.kernel.org: https://git.kernel.org/stable/c/2252c539c43f9a1431a7e8b34e3c18e9dd77a96d git.kernel.org: https://git.kernel.org/stable/c/3902205eadf35db59dbc2186c2a98b9e6182efa5 git.kernel.org: https://git.kernel.org/stable/c/3d828519bd69bfcaabdd942a872679617ef06739 git.kernel.org: https://git.kernel.org/stable/c/7d6bc28cfe5c8e3a279b4b4bdeed6698b2702685 git.kernel.org: https://git.kernel.org/stable/c/7851263998d4269125fd6cb3fdbfc7c6db853859 lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html