Bug 2376395 (CVE-2025-38190) - CVE-2025-38190 kernel: atm: Revert atm_account_tx() if copy_from_iter_full() fails.
Summary: CVE-2025-38190 kernel: atm: Revert atm_account_tx() if copy_from_iter_full() ...
Keywords:
Status: NEW
Alias: CVE-2025-38190
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
low
low
Target Milestone: ---
Assignee: Product Security DevOps Team
QA Contact:
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2025-07-04 14:03 UTC by OSIDB Bzimport
Modified: 2025-07-07 04:40 UTC (History)
0 users

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description OSIDB Bzimport 2025-07-04 14:03:41 UTC
In the Linux kernel, the following vulnerability has been resolved:

atm: Revert atm_account_tx() if copy_from_iter_full() fails.

In vcc_sendmsg(), we account skb->truesize to sk->sk_wmem_alloc by
atm_account_tx().

It is expected to be reverted by atm_pop_raw() later called by
vcc->dev->ops->send(vcc, skb).

However, vcc_sendmsg() misses the same revert when copy_from_iter_full()
fails, and then we will leak a socket.

Let's factorise the revert part as atm_return_tx() and call it in
the failure path.

Note that the corresponding sk_wmem_alloc operation can be found in
alloc_tx() as of the blamed commit.

  $ git blame -L:alloc_tx net/atm/common.c c55fa3cccbc2c~

Comment 1 Avinash Hanwate 2025-07-07 04:29:55 UTC
Upstream advisory:
https://lore.kernel.org/linux-cve-announce/2025070414-CVE-2025-38190-5b22@gregkh/T


Note You need to log in before you can comment on or make changes to this bug.