We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-38458

atm: clip: Fix NULL pointer dereference in vcc_sendmsg()



Description

In the Linux kernel, the following vulnerability has been resolved: atm: clip: Fix NULL pointer dereference in vcc_sendmsg() atmarpd_dev_ops does not implement the send method, which may cause crash as bellow. BUG: kernel NULL pointer dereference, address: 0000000000000000 PGD 0 P4D 0 Oops: Oops: 0010 [#1] SMP KASAN NOPTI CPU: 0 UID: 0 PID: 5324 Comm: syz.0.0 Not tainted 6.15.0-rc6-syzkaller-00346-g5723cc3450bc #0 PREEMPT(full) Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2~bpo12+1 04/01/2014 RIP: 0010:0x0 Code: Unable to access opcode bytes at 0xffffffffffffffd6. RSP: 0018:ffffc9000d3cf778 EFLAGS: 00010246 RAX: 1ffffffff1910dd1 RBX: 00000000000000c0 RCX: dffffc0000000000 RDX: ffffc9000dc82000 RSI: ffff88803e4c4640 RDI: ffff888052cd0000 RBP: ffffc9000d3cf8d0 R08: ffff888052c9143f R09: 1ffff1100a592287 R10: dffffc0000000000 R11: 0000000000000000 R12: 1ffff92001a79f00 R13: ffff888052cd0000 R14: ffff88803e4c4640 R15: ffffffff8c886e88 FS: 00007fbc762566c0(0000) GS:ffff88808d6c2000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: ffffffffffffffd6 CR3: 0000000041f1b000 CR4: 0000000000352ef0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: <TASK> vcc_sendmsg+0xa10/0xc50 net/atm/common.c:644 sock_sendmsg_nosec net/socket.c:712 [inline] __sock_sendmsg+0x219/0x270 net/socket.c:727 ____sys_sendmsg+0x52d/0x830 net/socket.c:2566 ___sys_sendmsg+0x21f/0x2a0 net/socket.c:2620 __sys_sendmmsg+0x227/0x430 net/socket.c:2709 __do_sys_sendmmsg net/socket.c:2736 [inline] __se_sys_sendmmsg net/socket.c:2733 [inline] __x64_sys_sendmmsg+0xa0/0xc0 net/socket.c:2733 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0xf6/0x210 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f

Reserved 2025-04-16 | Published 2025-07-25 | Updated 2025-07-25 | Assigner Linux

Product status

Default status
unaffected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before 9ec7e943aee5c28c173933f9defd40892fb3be3d
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before a16fbe6087e91c8e7c4aa50e1af7ad56edbd9e3e
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before 7f1cad84ac1a6af42d9d57e879de47ce37995024
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before 27b5bb7ea1a8fa7b8c4cfde4d2bf8650cca2e8e8
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before 07b585ae3699c0a5026f86ac846f144e34875eee
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before 34a09d6240a25185ef6fc5a19dbb3cdbb6a78bc0
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before 7f8a9b396037daae453a108faec5b28886361323
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before 22fc46cea91df3dce140a7dc6847c6fcf0354505
affected

Default status
affected

2.6.12
affected

Any version before 2.6.12
unaffected

5.4.296
unaffected

5.10.240
unaffected

5.15.189
unaffected

6.1.146
unaffected

6.6.99
unaffected

6.12.39
unaffected

6.15.7
unaffected

6.16-rc6
unaffected

References

git.kernel.org/...c/9ec7e943aee5c28c173933f9defd40892fb3be3d

git.kernel.org/...c/a16fbe6087e91c8e7c4aa50e1af7ad56edbd9e3e

git.kernel.org/...c/7f1cad84ac1a6af42d9d57e879de47ce37995024

git.kernel.org/...c/27b5bb7ea1a8fa7b8c4cfde4d2bf8650cca2e8e8

git.kernel.org/...c/07b585ae3699c0a5026f86ac846f144e34875eee

git.kernel.org/...c/34a09d6240a25185ef6fc5a19dbb3cdbb6a78bc0

git.kernel.org/...c/7f8a9b396037daae453a108faec5b28886361323

git.kernel.org/...c/22fc46cea91df3dce140a7dc6847c6fcf0354505

cve.org (CVE-2025-38458)

nvd.nist.gov (CVE-2025-38458)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-38458

Support options

Helpdesk Chat, Email, Knowledgebase