-

CVE-2025-38190

In the Linux kernel, the following vulnerability has been resolved:

atm: Revert atm_account_tx() if copy_from_iter_full() fails.

In vcc_sendmsg(), we account skb->truesize to sk->sk_wmem_alloc by
atm_account_tx().

It is expected to be reverted by atm_pop_raw() later called by
vcc->dev->ops->send(vcc, skb).

However, vcc_sendmsg() misses the same revert when copy_from_iter_full()
fails, and then we will leak a socket.

Let's factorise the revert part as atm_return_tx() and call it in
the failure path.

Note that the corresponding sk_wmem_alloc operation can be found in
alloc_tx() as of the blamed commit.

  $ git blame -L:alloc_tx net/atm/common.c c55fa3cccbc2c~

Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
VendorLinux
Product Linux
Default Statusunaffected
Version < 5e0d00992118e234ebf29d5145c1cc920342777e
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < c12430edd92fd49a4800b0f3fb395b50cb16bcc1
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < 287b4f085d2ca3375cf1ee672af27410c64777e8
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < 2252c539c43f9a1431a7e8b34e3c18e9dd77a96d
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < 3902205eadf35db59dbc2186c2a98b9e6182efa5
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < 3d828519bd69bfcaabdd942a872679617ef06739
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < 7d6bc28cfe5c8e3a279b4b4bdeed6698b2702685
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < 7851263998d4269125fd6cb3fdbfc7c6db853859
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
VendorLinux
Product Linux
Default Statusaffected
Version 2.6.12
Status affected
Version < 2.6.12
Version 0
Status unaffected
Version <= 5.4.*
Version 5.4.295
Status unaffected
Version <= 5.10.*
Version 5.10.239
Status unaffected
Version <= 5.15.*
Version 5.15.186
Status unaffected
Version <= 6.1.*
Version 6.1.142
Status unaffected
Version <= 6.6.*
Version 6.6.95
Status unaffected
Version <= 6.12.*
Version 6.12.35
Status unaffected
Version <= 6.15.*
Version 6.15.4
Status unaffected
Version <= *
Version 6.16
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.04% 0.097
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string