U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

CVE-2025-38546 Detail

Description

In the Linux kernel, the following vulnerability has been resolved: atm: clip: Fix memory leak of struct clip_vcc. ioctl(ATMARP_MKIP) allocates struct clip_vcc and set it to vcc->user_back. The code assumes that vcc_destroy_socket() passes NULL skb to vcc->push() when the socket is close()d, and then clip_push() frees clip_vcc. However, ioctl(ATMARPD_CTRL) sets NULL to vcc->push() in atm_init_atmarp(), resulting in memory leak. Let's serialise two ioctl() by lock_sock() and check vcc->push() in atm_init_atmarp() to prevent memleak.


Metrics

NVD enrichment efforts reference publicly available information to associate vector strings. CVSS information contributed by other sources is also displayed.
CVSS 4.0 Severity and Vector Strings:

NIST CVSS score
NIST: NVD
N/A
NVD assessment not yet provided.

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to [email protected].

URL Source(s) Tag(s)
https://git.kernel.org/stable/c/0c17ff462d98c997d707ee5cf4e4a9b1b52b9d90 kernel.org
https://git.kernel.org/stable/c/1c075e88d5859a2c6b43b27e0e46fb281cef8039 kernel.org
https://git.kernel.org/stable/c/1fb9fb5a4b5cec2d56e26525ef8c519de858fa60 kernel.org
https://git.kernel.org/stable/c/2fb37ab3226606cbfc9b2b6f9e301b0b735734c5 kernel.org
https://git.kernel.org/stable/c/62dba28275a9a3104d4e33595c7b3328d4032d8d kernel.org
https://git.kernel.org/stable/c/9e4dbeee56f614e3f1e166e5d0655a999ea185ef kernel.org
https://git.kernel.org/stable/c/9f771816f14da6d6157a8c30069091abf6b566fb kernel.org
https://git.kernel.org/stable/c/cb2e4a2f8f268d8fba6662f663a2e57846f14a8d kernel.org

Weakness Enumeration

CWE-ID CWE Name Source

Change History

1 change records found show changes

Quick Info

CVE Dictionary Entry:
CVE-2025-38546
NVD Published Date:
08/16/2025
NVD Last Modified:
08/18/2025
Source:
kernel.org