CVE-2025-68787

Source
https://cve.org/CVERecord?id=CVE-2025-68787
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-68787.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-68787
Downstream
Related
Published
2026-01-13T15:29:00.344Z
Modified
2026-03-20T12:46:28.838294Z
Summary
netrom: Fix memory leak in nr_sendmsg()
Details

In the Linux kernel, the following vulnerability has been resolved:

netrom: Fix memory leak in nr_sendmsg()

syzbot reported a memory leak [1].

When function sockallocsendskb() return NULL in nroutput(), the original skb is not freed, which was allocated in nr_sendmsg(). Fix this by freeing it before return.

[1] BUG: memory leak unreferenced object 0xffff888129f35500 (size 240): comm "syz.0.17", pid 6119, jiffies 4294944652 hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 10 52 28 81 88 ff ff ..........R(.... backtrace (crc 1456a3e4): kmemleakallocrecursive include/linux/kmemleak.h:44 [inline] slabpostallochook mm/slub.c:4983 [inline] slaballocnode mm/slub.c:5288 [inline] kmemcacheallocnode_noprof+0x36f/0x5e0 mm/slub.c:5340 __allocskb+0x203/0x240 net/core/skbuff.c:660 allocskb include/linux/skbuff.h:1383 [inline] allocskbwithfrags+0x69/0x3f0 net/core/skbuff.c:6671 sockallocsendpskb+0x379/0x3e0 net/core/sock.c:2965 sockallocsendskb include/net/sock.h:1859 [inline] nrsendmsg+0x287/0x450 net/netrom/afnetrom.c:1105 socksendmsg_nosec net/socket.c:727 [inline] __socksendmsg net/socket.c:742 [inline] sockwriteiter+0x293/0x2a0 net/socket.c:1195 newsyncwrite fs/readwrite.c:593 [inline] vfswrite+0x45d/0x710 fs/readwrite.c:686 ksyswrite+0x143/0x170 fs/readwrite.c:738 dosyscallx64 arch/x86/entry/syscall64.c:63 [inline] dosyscall64+0xa4/0xfa0 arch/x86/entry/syscall64.c:94 entrySYSCALL64afterhwframe+0x77/0x7f

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/68xxx/CVE-2025-68787.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Fixed
f77e538ac4e3adb1882d5bccb7bfdc111b5963d3
Fixed
09efbf54eeaecebe882af603c9939a4b1bb9567e
Fixed
73839497bbde5cd4fd02bbd9c8bc2640780ae65d
Fixed
156a0f6341dce634a825db49ca20b48b1ae9bcc1
Fixed
8d1ccba4b171cd504ecfa47349cb9864fc9d687c
Fixed
51f5fbc1681bdcffcc7d18bf3dfdb2b1278d3977
Fixed
613d12dd794e078be8ff3cf6b62a6b9acf7f4619

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-68787.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
2.6.12
Fixed
5.10.248
Type
ECOSYSTEM
Events
Introduced
5.11.0
Fixed
5.15.198
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
6.1.160
Type
ECOSYSTEM
Events
Introduced
6.2.0
Fixed
6.6.120
Type
ECOSYSTEM
Events
Introduced
6.7.0
Fixed
6.12.64
Type
ECOSYSTEM
Events
Introduced
6.13.0
Fixed
6.18.3

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-68787.json"