CVE-2025-38459
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
25/07/2025
Last modified:
22/12/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
atm: clip: Fix infinite recursive call of clip_push().<br />
<br />
syzbot reported the splat below. [0]<br />
<br />
This happens if we call ioctl(ATMARP_MKIP) more than once.<br />
<br />
During the first call, clip_mkip() sets clip_push() to vcc->push(),<br />
and the second call copies it to clip_vcc->old_push().<br />
<br />
Later, when the socket is close()d, vcc_destroy_socket() passes<br />
NULL skb to clip_push(), which calls clip_vcc->old_push(),<br />
triggering the infinite recursion.<br />
<br />
Let&#39;s prevent the second ioctl(ATMARP_MKIP) by checking<br />
vcc->user_back, which is allocated by the first call as clip_vcc.<br />
<br />
Note also that we use lock_sock() to prevent racy calls.<br />
<br />
[0]:<br />
BUG: TASK stack guard page was hit at ffffc9000d66fff8 (stack is ffffc9000d670000..ffffc9000d678000)<br />
Oops: stack guard page: 0000 [#1] SMP KASAN NOPTI<br />
CPU: 0 UID: 0 PID: 5322 Comm: syz.0.0 Not tainted 6.16.0-rc4-syzkaller #0 PREEMPT(full)<br />
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2~bpo12+1 04/01/2014<br />
RIP: 0010:clip_push+0x5/0x720 net/atm/clip.c:191<br />
Code: e0 8f aa 8c e8 1c ad 5b fa eb ae 66 2e 0f 1f 84 00 00 00 00 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 f3 0f 1e fa 55 57 41 56 41 55 41 54 53 48 83 ec 20 48 89 f3 49 89 fd 48 bd 00<br />
RSP: 0018:ffffc9000d670000 EFLAGS: 00010246<br />
RAX: 1ffff1100235a4a5 RBX: ffff888011ad2508 RCX: ffff8880003c0000<br />
RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffff888037f01000<br />
RBP: dffffc0000000000 R08: ffffffff8fa104f7 R09: 1ffffffff1f4209e<br />
R10: dffffc0000000000 R11: ffffffff8a99b300 R12: ffffffff8a99b300<br />
R13: ffff888037f01000 R14: ffff888011ad2500 R15: ffff888037f01578<br />
FS: 000055557ab6d500(0000) GS:ffff88808d250000(0000) knlGS:0000000000000000<br />
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033<br />
CR2: ffffc9000d66fff8 CR3: 0000000043172000 CR4: 0000000000352ef0<br />
Call Trace:<br />
<br />
clip_push+0x6dc/0x720 net/atm/clip.c:200<br />
clip_push+0x6dc/0x720 net/atm/clip.c:200<br />
clip_push+0x6dc/0x720 net/atm/clip.c:200<br />
...<br />
clip_push+0x6dc/0x720 net/atm/clip.c:200<br />
clip_push+0x6dc/0x720 net/atm/clip.c:200<br />
clip_push+0x6dc/0x720 net/atm/clip.c:200<br />
vcc_destroy_socket net/atm/common.c:183 [inline]<br />
vcc_release+0x157/0x460 net/atm/common.c:205<br />
__sock_release net/socket.c:647 [inline]<br />
sock_close+0xc0/0x240 net/socket.c:1391<br />
__fput+0x449/0xa70 fs/file_table.c:465<br />
task_work_run+0x1d1/0x260 kernel/task_work.c:227<br />
resume_user_mode_work include/linux/resume_user_mode.h:50 [inline]<br />
exit_to_user_mode_loop+0xec/0x110 kernel/entry/common.c:114<br />
exit_to_user_mode_prepare include/linux/entry-common.h:330 [inline]<br />
syscall_exit_to_user_mode_work include/linux/entry-common.h:414 [inline]<br />
syscall_exit_to_user_mode include/linux/entry-common.h:449 [inline]<br />
do_syscall_64+0x2bd/0x3b0 arch/x86/entry/syscall_64.c:100<br />
entry_SYSCALL_64_after_hwframe+0x77/0x7f<br />
RIP: 0033:0x7ff31c98e929<br />
Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48<br />
RSP: 002b:00007fffb5aa1f78 EFLAGS: 00000246 ORIG_RAX: 00000000000001b4<br />
RAX: 0000000000000000 RBX: 0000000000012747 RCX: 00007ff31c98e929<br />
RDX: 0000000000000000 RSI: 000000000000001e RDI: 0000000000000003<br />
RBP: 00007ff31cbb7ba0 R08: 0000000000000001 R09: 0000000db5aa226f<br />
R10: 00007ff31c7ff030 R11: 0000000000000246 R12: 00007ff31cbb608c<br />
R13: 00007ff31cbb6080 R14: ffffffffffffffff R15: 00007fffb5aa2090<br />
<br />
Modules linked in:
Impact
Base Score 3.x
7.80
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 2.6.13 (including) | 5.4.296 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.5 (including) | 5.10.240 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.11 (including) | 5.15.189 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (including) | 6.1.146 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.6.99 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.12.39 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.13 (including) | 6.15.7 (excluding) |
| cpe:2.3:o:linux:linux_kernel:2.6.12:-:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:2.6.12:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:2.6.12:rc3:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:2.6.12:rc4:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:2.6.12:rc5:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.16:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.16:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.16:rc3:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/024876b247a882972095b22087734dcd23396a4e
- https://git.kernel.org/stable/c/125166347d5676466d368aadc0bbc31ee7714352
- https://git.kernel.org/stable/c/1579a2777cb914a249de22c789ba4d41b154509f
- https://git.kernel.org/stable/c/3f61b997fe014bbfcc208a9fcbd363a1fe7e3a31
- https://git.kernel.org/stable/c/5641019dfbaee5e85fe093b590f0451c9dd4d6f8
- https://git.kernel.org/stable/c/c489f3283dbfc0f3c00c312149cae90d27552c45
- https://git.kernel.org/stable/c/df0312d8859763aa15b8b56ac151a1ea4a4e5b88
- https://git.kernel.org/stable/c/f493f31a63847624fd3199ac836a8bd8828e50e2
- https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html
- https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html



