CVE-2025-38458
Severity CVSS v4.0:
Pending analysis
Type:
CWE-476
NULL Pointer Dereference
Publication date:
25/07/2025
Last modified:
22/12/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
atm: clip: Fix NULL pointer dereference in vcc_sendmsg()<br />
<br />
atmarpd_dev_ops does not implement the send method, which may cause crash<br />
as bellow.<br />
<br />
BUG: kernel NULL pointer dereference, address: 0000000000000000<br />
PGD 0 P4D 0<br />
Oops: Oops: 0010 [#1] SMP KASAN NOPTI<br />
CPU: 0 UID: 0 PID: 5324 Comm: syz.0.0 Not tainted 6.15.0-rc6-syzkaller-00346-g5723cc3450bc #0 PREEMPT(full)<br />
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2~bpo12+1 04/01/2014<br />
RIP: 0010:0x0<br />
Code: Unable to access opcode bytes at 0xffffffffffffffd6.<br />
RSP: 0018:ffffc9000d3cf778 EFLAGS: 00010246<br />
RAX: 1ffffffff1910dd1 RBX: 00000000000000c0 RCX: dffffc0000000000<br />
RDX: ffffc9000dc82000 RSI: ffff88803e4c4640 RDI: ffff888052cd0000<br />
RBP: ffffc9000d3cf8d0 R08: ffff888052c9143f R09: 1ffff1100a592287<br />
R10: dffffc0000000000 R11: 0000000000000000 R12: 1ffff92001a79f00<br />
R13: ffff888052cd0000 R14: ffff88803e4c4640 R15: ffffffff8c886e88<br />
FS: 00007fbc762566c0(0000) GS:ffff88808d6c2000(0000) knlGS:0000000000000000<br />
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033<br />
CR2: ffffffffffffffd6 CR3: 0000000041f1b000 CR4: 0000000000352ef0<br />
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000<br />
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400<br />
Call Trace:<br />
<br />
vcc_sendmsg+0xa10/0xc50 net/atm/common.c:644<br />
sock_sendmsg_nosec net/socket.c:712 [inline]<br />
__sock_sendmsg+0x219/0x270 net/socket.c:727<br />
____sys_sendmsg+0x52d/0x830 net/socket.c:2566<br />
___sys_sendmsg+0x21f/0x2a0 net/socket.c:2620<br />
__sys_sendmmsg+0x227/0x430 net/socket.c:2709<br />
__do_sys_sendmmsg net/socket.c:2736 [inline]<br />
__se_sys_sendmmsg net/socket.c:2733 [inline]<br />
__x64_sys_sendmmsg+0xa0/0xc0 net/socket.c:2733<br />
do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]<br />
do_syscall_64+0xf6/0x210 arch/x86/entry/syscall_64.c:94<br />
entry_SYSCALL_64_after_hwframe+0x77/0x7f
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 2.6.13 (including) | 5.4.296 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.5 (including) | 5.10.240 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.11 (including) | 5.15.189 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (including) | 6.1.146 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.6.99 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.12.39 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.13 (including) | 6.15.7 (excluding) |
| cpe:2.3:o:linux:linux_kernel:2.6.12:-:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:2.6.12:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:2.6.12:rc3:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:2.6.12:rc4:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:2.6.12:rc5:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.16:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.16:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.16:rc3:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/07b585ae3699c0a5026f86ac846f144e34875eee
- https://git.kernel.org/stable/c/22fc46cea91df3dce140a7dc6847c6fcf0354505
- https://git.kernel.org/stable/c/27b5bb7ea1a8fa7b8c4cfde4d2bf8650cca2e8e8
- https://git.kernel.org/stable/c/34a09d6240a25185ef6fc5a19dbb3cdbb6a78bc0
- https://git.kernel.org/stable/c/7f1cad84ac1a6af42d9d57e879de47ce37995024
- https://git.kernel.org/stable/c/7f8a9b396037daae453a108faec5b28886361323
- https://git.kernel.org/stable/c/9ec7e943aee5c28c173933f9defd40892fb3be3d
- https://git.kernel.org/stable/c/a16fbe6087e91c8e7c4aa50e1af7ad56edbd9e3e
- https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html
- https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html



