In the Linux kernel, the following vulnerability has been resolved:
atm: clip: Fix NULL pointer dereference in vcc_sendmsg()
atmarpddevops does not implement the send method, which may cause crash as bellow.
BUG: kernel NULL pointer dereference, address: 0000000000000000 PGD 0 P4D 0 Oops: Oops: 0010 [#1] SMP KASAN NOPTI CPU: 0 UID: 0 PID: 5324 Comm: syz.0.0 Not tainted 6.15.0-rc6-syzkaller-00346-g5723cc3450bc #0 PREEMPT(full) Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2~bpo12+1 04/01/2014 RIP: 0010:0x0 Code: Unable to access opcode bytes at 0xffffffffffffffd6. RSP: 0018:ffffc9000d3cf778 EFLAGS: 00010246 RAX: 1ffffffff1910dd1 RBX: 00000000000000c0 RCX: dffffc0000000000 RDX: ffffc9000dc82000 RSI: ffff88803e4c4640 RDI: ffff888052cd0000 RBP: ffffc9000d3cf8d0 R08: ffff888052c9143f R09: 1ffff1100a592287 R10: dffffc0000000000 R11: 0000000000000000 R12: 1ffff92001a79f00 R13: ffff888052cd0000 R14: ffff88803e4c4640 R15: ffffffff8c886e88 FS: 00007fbc762566c0(0000) GS:ffff88808d6c2000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: ffffffffffffffd6 CR3: 0000000041f1b000 CR4: 0000000000352ef0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: <TASK> vccsendmsg+0xa10/0xc50 net/atm/common.c:644 socksendmsgnosec net/socket.c:712 [inline] socksendmsg+0x219/0x270 net/socket.c:727 syssendmsg+0x52d/0x830 net/socket.c:2566 _syssendmsg+0x21f/0x2a0 net/socket.c:2620 _syssendmmsg+0x227/0x430 net/socket.c:2709 _dosyssendmmsg net/socket.c:2736 [inline] _sesyssendmmsg net/socket.c:2733 [inline] _x64syssendmmsg+0xa0/0xc0 net/socket.c:2733 dosyscallx64 arch/x86/entry/syscall64.c:63 [inline] dosyscall64+0xf6/0x210 arch/x86/entry/syscall64.c:94 entrySYSCALL64after_hwframe+0x77/0x7f
[ { "signature_type": "Line", "id": "CVE-2025-38458-125f3feb", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@a16fbe6087e91c8e7c4aa50e1af7ad56edbd9e3e", "signature_version": "v1", "target": { "file": "net/atm/clip.c" }, "digest": { "threshold": 0.9, "line_hashes": [ "253405722968405353948516557111472288787", "322094020201109144891917041367704568685", "174518474192252739214418743061762195485", "113477905843667290504340183586160486124", "26722565184508664423943282826666664051" ] }, "deprecated": false }, { "signature_type": "Line", "id": "CVE-2025-38458-42961698", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@7f8a9b396037daae453a108faec5b28886361323", "signature_version": "v1", "target": { "file": "net/atm/clip.c" }, "digest": { "threshold": 0.9, "line_hashes": [ "253405722968405353948516557111472288787", "322094020201109144891917041367704568685", "174518474192252739214418743061762195485", "113477905843667290504340183586160486124", "26722565184508664423943282826666664051" ] }, "deprecated": false }, { "signature_type": "Line", "id": "CVE-2025-38458-8b9df846", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@07b585ae3699c0a5026f86ac846f144e34875eee", "signature_version": "v1", "target": { "file": "net/atm/clip.c" }, "digest": { "threshold": 0.9, "line_hashes": [ "253405722968405353948516557111472288787", "322094020201109144891917041367704568685", "174518474192252739214418743061762195485", "113477905843667290504340183586160486124", "26722565184508664423943282826666664051" ] }, "deprecated": false }, { "signature_type": "Line", "id": "CVE-2025-38458-985fdab7", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@34a09d6240a25185ef6fc5a19dbb3cdbb6a78bc0", "signature_version": "v1", "target": { "file": "net/atm/clip.c" }, "digest": { "threshold": 0.9, "line_hashes": [ "253405722968405353948516557111472288787", "322094020201109144891917041367704568685", "174518474192252739214418743061762195485", "113477905843667290504340183586160486124", "26722565184508664423943282826666664051" ] }, "deprecated": false }, { "signature_type": "Line", "id": "CVE-2025-38458-a94ef9b6", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@27b5bb7ea1a8fa7b8c4cfde4d2bf8650cca2e8e8", "signature_version": "v1", "target": { "file": "net/atm/clip.c" }, "digest": { "threshold": 0.9, "line_hashes": [ "253405722968405353948516557111472288787", "322094020201109144891917041367704568685", "174518474192252739214418743061762195485", "113477905843667290504340183586160486124", "26722565184508664423943282826666664051" ] }, "deprecated": false }, { "signature_type": "Line", "id": "CVE-2025-38458-dca59710", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@22fc46cea91df3dce140a7dc6847c6fcf0354505", "signature_version": "v1", "target": { "file": "net/atm/clip.c" }, "digest": { "threshold": 0.9, "line_hashes": [ "253405722968405353948516557111472288787", "322094020201109144891917041367704568685", "174518474192252739214418743061762195485", "113477905843667290504340183586160486124", "26722565184508664423943282826666664051" ] }, "deprecated": false }, { "signature_type": "Line", "id": "CVE-2025-38458-f8f6e1aa", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@9ec7e943aee5c28c173933f9defd40892fb3be3d", "signature_version": "v1", "target": { "file": "net/atm/clip.c" }, "digest": { "threshold": 0.9, "line_hashes": [ "253405722968405353948516557111472288787", "322094020201109144891917041367704568685", "174518474192252739214418743061762195485", "113477905843667290504340183586160486124", "26722565184508664423943282826666664051" ] }, "deprecated": false }, { "signature_type": "Line", "id": "CVE-2025-38458-fdb0584e", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@7f1cad84ac1a6af42d9d57e879de47ce37995024", "signature_version": "v1", "target": { "file": "net/atm/clip.c" }, "digest": { "threshold": 0.9, "line_hashes": [ "253405722968405353948516557111472288787", "322094020201109144891917041367704568685", "174518474192252739214418743061762195485", "113477905843667290504340183586160486124", "26722565184508664423943282826666664051" ] }, "deprecated": false } ]