๐Ÿ” CVE Alert

CVE-2025-68787

UNKNOWN 0.0

netrom: Fix memory leak in nr_sendmsg()

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: netrom: Fix memory leak in nr_sendmsg() syzbot reported a memory leak [1]. When function sock_alloc_send_skb() return NULL in nr_output(), the original skb is not freed, which was allocated in nr_sendmsg(). Fix this by freeing it before return. [1] BUG: memory leak unreferenced object 0xffff888129f35500 (size 240): comm "syz.0.17", pid 6119, jiffies 4294944652 hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 10 52 28 81 88 ff ff ..........R(.... backtrace (crc 1456a3e4): kmemleak_alloc_recursive include/linux/kmemleak.h:44 [inline] slab_post_alloc_hook mm/slub.c:4983 [inline] slab_alloc_node mm/slub.c:5288 [inline] kmem_cache_alloc_node_noprof+0x36f/0x5e0 mm/slub.c:5340 __alloc_skb+0x203/0x240 net/core/skbuff.c:660 alloc_skb include/linux/skbuff.h:1383 [inline] alloc_skb_with_frags+0x69/0x3f0 net/core/skbuff.c:6671 sock_alloc_send_pskb+0x379/0x3e0 net/core/sock.c:2965 sock_alloc_send_skb include/net/sock.h:1859 [inline] nr_sendmsg+0x287/0x450 net/netrom/af_netrom.c:1105 sock_sendmsg_nosec net/socket.c:727 [inline] __sock_sendmsg net/socket.c:742 [inline] sock_write_iter+0x293/0x2a0 net/socket.c:1195 new_sync_write fs/read_write.c:593 [inline] vfs_write+0x45d/0x710 fs/read_write.c:686 ksys_write+0x143/0x170 fs/read_write.c:738 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0xa4/0xfa0 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Jan 13, 2026
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < f77e538ac4e3adb1882d5bccb7bfdc111b5963d3 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < 09efbf54eeaecebe882af603c9939a4b1bb9567e 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < 73839497bbde5cd4fd02bbd9c8bc2640780ae65d 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < 156a0f6341dce634a825db49ca20b48b1ae9bcc1 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < 8d1ccba4b171cd504ecfa47349cb9864fc9d687c 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < 51f5fbc1681bdcffcc7d18bf3dfdb2b1278d3977 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < 613d12dd794e078be8ff3cf6b62a6b9acf7f4619
Linux / Linux
2.6.12

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/f77e538ac4e3adb1882d5bccb7bfdc111b5963d3 git.kernel.org: https://git.kernel.org/stable/c/09efbf54eeaecebe882af603c9939a4b1bb9567e git.kernel.org: https://git.kernel.org/stable/c/73839497bbde5cd4fd02bbd9c8bc2640780ae65d git.kernel.org: https://git.kernel.org/stable/c/156a0f6341dce634a825db49ca20b48b1ae9bcc1 git.kernel.org: https://git.kernel.org/stable/c/8d1ccba4b171cd504ecfa47349cb9864fc9d687c git.kernel.org: https://git.kernel.org/stable/c/51f5fbc1681bdcffcc7d18bf3dfdb2b1278d3977 git.kernel.org: https://git.kernel.org/stable/c/613d12dd794e078be8ff3cf6b62a6b9acf7f4619