CVE-2025-38185

Source
https://cve.org/CVERecord?id=CVE-2025-38185
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-38185.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-38185
Downstream
Related
Published
2025-07-04T13:37:11.885Z
Modified
2026-05-07T04:17:02.179144Z
Summary
atm: atmtcp: Free invalid length skb in atmtcp_c_send().
Details

In the Linux kernel, the following vulnerability has been resolved:

atm: atmtcp: Free invalid length skb in atmtcpcsend().

syzbot reported the splat below. [0]

vcc_sendmsg() copies data passed from userspace to skb and passes it to vcc->dev->ops->send().

atmtcpcsend() accesses skb->data as struct atmtcp_hdr after checking if skb->len is 0, but it's not enough.

Also, when skb->len == 0, skb and sk (vcc) were leaked because devkfreeskb() is not called and skwmemalloc adjustment is missing to revert atmaccounttx() in vccsendmsg(), which is expected to be done in atmpop_raw().

Let's properly free skb with an invalid length in atmtcpcsend().

atmtcpcsend+0x255/0xed0 drivers/atm/atmtcp.c:294 vccsendmsg+0xd7c/0xff0 net/atm/common.c:644 socksendmsg_nosec net/socket.c:712 [inline] __sock_sendmsg+0x330/0x3d0 net/socket.c:727 ____sys_sendmsg+0x7e0/0xd80 net/socket.c:2566 ___sys_sendmsg+0x271/0x3b0 net/socket.c:2620 __sys_sendmsg net/socket.c:2652 [inline] __dosyssendmsg net/socket.c:2657 [inline] __sesyssendmsg net/socket.c:2655 [inline] _x64syssendmsg+0x211/0x3e0 net/socket.c:2655 x64syscall+0x32fb/0x3db0 arch/x86/include/generated/asm/syscalls64.h:47 dosyscallx64 arch/x86/entry/syscall64.c:63 [inline] dosyscall64+0xd9/0x210 arch/x86/entry/syscall64.c:94 entrySYSCALL64afterhwframe+0x77/0x7f

Uninit was created at: slabpostallochook mm/slub.c:4154 [inline] slaballocnode mm/slub.c:4197 [inline] kmemcacheallocnodenoprof+0x818/0xf00 mm/slub.c:4249 kmallocreserve+0x13c/0x4b0 net/core/skbuff.c:579 __allocskb+0x347/0x7d0 net/core/skbuff.c:670 allocskb include/linux/skbuff.h:1336 [inline] vcc_sendmsg+0xb40/0xff0 net/atm/common.c:628 socksendmsgnosec net/socket.c:712 [inline] __sock_sendmsg+0x330/0x3d0 net/socket.c:727 ____sys_sendmsg+0x7e0/0xd80 net/socket.c:2566 ___sys_sendmsg+0x271/0x3b0 net/socket.c:2620 __sys_sendmsg net/socket.c:2652 [inline] __dosyssendmsg net/socket.c:2657 [inline] __sesyssendmsg net/socket.c:2655 [inline] _x64syssendmsg+0x211/0x3e0 net/socket.c:2655 x64syscall+0x32fb/0x3db0 arch/x86/include/generated/asm/syscalls64.h:47 dosyscallx64 arch/x86/entry/syscall64.c:63 [inline] dosyscall64+0xd9/0x210 arch/x86/entry/syscall64.c:94 entrySYSCALL64afterhwframe+0x77/0x7f

CPU: 1 UID: 0 PID: 5798 Comm: syz-executor192 Not tainted 6.16.0-rc1-syzkaller-00010-g2c4a1f3fe03e #0 PREEMPT(undef) Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/38xxx/CVE-2025-38185.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Fixed
c19c0943424b412a84fdf178e6c71fe5480e4f0f
Fixed
a4b0fd8c25a7583f8564af6cc910418fb8954e89
Fixed
1b0ad18704913c92a3ad53748fbc0f219a75b876
Fixed
ca00f0e6d733ecd9150716d1fd0138d26e674706
Fixed
3261c017a7c5d2815c6a388c5a3280d1fba0e8db
Fixed
e996507f59610e5752b8702537f13f551e7a2c96
Fixed
c9260c837de1d2b454960a4a2e44a81272fbcd22
Fixed
2f370ae1fb6317985f3497b1bb80d457508ca2f7

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-38185.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
2.6.12
Fixed
5.4.295
Type
ECOSYSTEM
Events
Introduced
5.5.0
Fixed
5.10.239
Type
ECOSYSTEM
Events
Introduced
5.11.0
Fixed
5.15.186
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
6.1.142
Type
ECOSYSTEM
Events
Introduced
6.2.0
Fixed
6.6.95
Type
ECOSYSTEM
Events
Introduced
6.7.0
Fixed
6.12.35
Type
ECOSYSTEM
Events
Introduced
6.13.0
Fixed
6.15.4

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-38185.json"