Fixed
Created: Jul 28, 2025
Updated: Aug 28, 2025
Resolved Date: Aug 28, 2025
Found In Version: 10.22.33.1
Severity: Standard
Applicable for: Wind River Linux LTS 22
Component/s: Kernel
In the Linux kernel, the following vulnerability has been resolved:EOL][EOL]atm: clip: Fix NULL pointer dereference in vcc_sendmsg()[EOL][EOL]atmarpd_dev_ops does not implement the send method, which may cause crash[EOL]as bellow.[EOL][EOL]BUG: kernel NULL pointer dereference, address: 0000000000000000[EOL]PGD 0 P4D 0[EOL]Oops: Oops: 0010 [#1] SMP KASAN NOPTI[EOL]CPU: 0 UID: 0 PID: 5324 Comm: syz.0.0 Not tainted 6.15.0-rc6-syzkaller-00346-g5723cc3450bc #0 PREEMPT(full)[EOL]Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2~bpo12+1 04/01/2014[EOL]RIP: 0010:0x0[EOL]Code: Unable to access opcode bytes at 0xffffffffffffffd6.[EOL]RSP: 0018:ffffc9000d3cf778 EFLAGS: 00010246[EOL]RAX: 1ffffffff1910dd1 RBX: 00000000000000c0 RCX: dffffc0000000000[EOL]RDX: ffffc9000dc82000 RSI: ffff88803e4c4640 RDI: ffff888052cd0000[EOL]RBP: ffffc9000d3cf8d0 R08: ffff888052c9143f R09: 1ffff1100a592287[EOL]R10: dffffc0000000000 R11: 0000000000000000 R12: 1ffff92001a79f00[EOL]R13: ffff888052cd0000 R14: ffff88803e4c4640 R15: ffffffff8c886e88[EOL]FS: 00007fbc762566c0(0000) GS:ffff88808d6c2000(0000) knlGS:0000000000000000[EOL]CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033[EOL]CR2: ffffffffffffffd6 CR3: 0000000041f1b000 CR4: 0000000000352ef0[EOL]DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000[EOL]DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400[EOL]Call Trace:[EOL] <TASK>[EOL] vcc_sendmsg+0xa10/0xc50 net/atm/common.c:644[EOL] sock_sendmsg_nosec net/socket.c:712 [inline][EOL] __sock_sendmsg+0x219/0x270 net/socket.c:727[EOL] ____sys_sendmsg+0x52d/0x830 net/socket.c:2566[EOL] ___sys_sendmsg+0x21f/0x2a0 net/socket.c:2620[EOL] __sys_sendmmsg+0x227/0x430 net/socket.c:2709[EOL] __do_sys_sendmmsg net/socket.c:2736 [inline][EOL] __se_sys_sendmmsg net/socket.c:2733 [inline][EOL] __x64_sys_sendmmsg+0xa0/0xc0 net/socket.c:2733[EOL] do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline][EOL] do_syscall_64+0xf6/0x210 arch/x86/entry/syscall_64.c:94[EOL] entry_SYSCALL_64_after_hwframe+0x77/0x7f
CREATE(Triage):(User=admin) [CVE-2025-38458 (https://nvd.nist.gov/vuln/detail/CVE-2025-38458)