CVE-2025-38546
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
16/08/2025
Last modified:
07/01/2026
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
atm: clip: Fix memory leak of struct clip_vcc.<br />
<br />
ioctl(ATMARP_MKIP) allocates struct clip_vcc and set it to<br />
vcc->user_back.<br />
<br />
The code assumes that vcc_destroy_socket() passes NULL skb<br />
to vcc->push() when the socket is close()d, and then clip_push()<br />
frees clip_vcc.<br />
<br />
However, ioctl(ATMARPD_CTRL) sets NULL to vcc->push() in<br />
atm_init_atmarp(), resulting in memory leak.<br />
<br />
Let&#39;s serialise two ioctl() by lock_sock() and check vcc->push()<br />
in atm_init_atmarp() to prevent memleak.
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 2.6.13 (including) | 5.4.296 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.5 (including) | 5.10.240 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.11 (including) | 5.15.189 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (including) | 6.1.146 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.6.99 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.12.39 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.13 (including) | 6.15.7 (excluding) |
| cpe:2.3:o:linux:linux_kernel:2.6.12:-:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:2.6.12:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:2.6.12:rc3:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:2.6.12:rc4:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:2.6.12:rc5:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.16:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.16:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.16:rc3:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/0c17ff462d98c997d707ee5cf4e4a9b1b52b9d90
- https://git.kernel.org/stable/c/1c075e88d5859a2c6b43b27e0e46fb281cef8039
- https://git.kernel.org/stable/c/1fb9fb5a4b5cec2d56e26525ef8c519de858fa60
- https://git.kernel.org/stable/c/2fb37ab3226606cbfc9b2b6f9e301b0b735734c5
- https://git.kernel.org/stable/c/62dba28275a9a3104d4e33595c7b3328d4032d8d
- https://git.kernel.org/stable/c/9e4dbeee56f614e3f1e166e5d0655a999ea185ef
- https://git.kernel.org/stable/c/9f771816f14da6d6157a8c30069091abf6b566fb
- https://git.kernel.org/stable/c/cb2e4a2f8f268d8fba6662f663a2e57846f14a8d
- https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html
- https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html



