CVE-2025-38574

In the Linux kernel, the following vulnerability has been resolved: pptp: ensure minimal skb length in pptp_xmit() Commit aabc6596ffb3 ("net: ppp: Add bound checking for skb data on ppp_sync_txmung") fixed ppp_sync_txmunge() We need a similar fix in pptp_xmit(), otherwise we might read uninit data as reported by syzbot. BUG: KMSAN: uninit-value in pptp_xmit+0xc34/0x2720 drivers/net/ppp/pptp.c:193 pptp_xmit+0xc34/0x2720 drivers/net/ppp/pptp.c:193 ppp_channel_bridge_input drivers/net/ppp/ppp_generic.c:2290 [inline] ppp_input+0x1d6/0xe60 drivers/net/ppp/ppp_generic.c:2314 pppoe_rcv_core+0x1e8/0x760 drivers/net/ppp/pppoe.c:379 sk_backlog_rcv+0x142/0x420 include/net/sock.h:1148 __release_sock+0x1d3/0x330 net/core/sock.c:3213 release_sock+0x6b/0x270 net/core/sock.c:3767 pppoe_sendmsg+0x15d/0xcb0 drivers/net/ppp/pppoe.c:904 sock_sendmsg_nosec net/socket.c:712 [inline] __sock_sendmsg+0x330/0x3d0 net/socket.c:727 ____sys_sendmsg+0x893/0xd80 net/socket.c:2566 ___sys_sendmsg+0x271/0x3b0 net/socket.c:2620 __sys_sendmmsg+0x2d9/0x7c0 net/socket.c:2709
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.12:-:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.12:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.12:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.12:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.12:rc5:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*

History

09 Jan 2026, 14:39

Type Values Removed Values Added
First Time Linux
Debian
Debian debian Linux
Linux linux Kernel
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
CWE CWE-908
References () https://git.kernel.org/stable/c/1a04db0fd75cb6034fc27a56b67b3b8b9022a98c - () https://git.kernel.org/stable/c/1a04db0fd75cb6034fc27a56b67b3b8b9022a98c - Patch
References () https://git.kernel.org/stable/c/26672f1679b143aa34fca0b6046b7fd0c184770d - () https://git.kernel.org/stable/c/26672f1679b143aa34fca0b6046b7fd0c184770d - Patch
References () https://git.kernel.org/stable/c/5005d24377378a20e5c0e53052fc4ebdcdcbc611 - () https://git.kernel.org/stable/c/5005d24377378a20e5c0e53052fc4ebdcdcbc611 - Patch
References () https://git.kernel.org/stable/c/504cc4ab91073d2ac7404ad146139f86ecee7193 - () https://git.kernel.org/stable/c/504cc4ab91073d2ac7404ad146139f86ecee7193 - Patch
References () https://git.kernel.org/stable/c/5de7513f38f3c19c0610294ee478242bea356f8c - () https://git.kernel.org/stable/c/5de7513f38f3c19c0610294ee478242bea356f8c - Patch
References () https://git.kernel.org/stable/c/97b8c5d322c5c0038cac4bc56fdbe237d0be426f - () https://git.kernel.org/stable/c/97b8c5d322c5c0038cac4bc56fdbe237d0be426f - Patch
References () https://git.kernel.org/stable/c/b7dcda76fd0615c0599c89f36873a6cd48e02dbb - () https://git.kernel.org/stable/c/b7dcda76fd0615c0599c89f36873a6cd48e02dbb - Patch
References () https://git.kernel.org/stable/c/de9c4861fb42f0cd72da844c3c34f692d5895b7b - () https://git.kernel.org/stable/c/de9c4861fb42f0cd72da844c3c34f692d5895b7b - Patch
References () https://git.kernel.org/stable/c/ea99b88b1999ebcb24d5d3a6b7910030f40d3bba - () https://git.kernel.org/stable/c/ea99b88b1999ebcb24d5d3a6b7910030f40d3bba - Patch
References () https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html - () https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html - Third Party Advisory, Mailing List
References () https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html - () https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html - Third Party Advisory, Mailing List
CPE cpe:2.3:o:linux:linux_kernel:2.6.12:rc2:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.12:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.12:-:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.12:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.12:rc5:*:*:*:*:*:*

03 Nov 2025, 18:16

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html -
  • () https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html -

28 Aug 2025, 15:15

Type Values Removed Values Added
References
  • () https://git.kernel.org/stable/c/26672f1679b143aa34fca0b6046b7fd0c184770d -
  • () https://git.kernel.org/stable/c/5de7513f38f3c19c0610294ee478242bea356f8c -
  • () https://git.kernel.org/stable/c/97b8c5d322c5c0038cac4bc56fdbe237d0be426f -

20 Aug 2025, 14:40

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: pptp: garantizar la longitud mínima de skb en pptp_xmit() Se corrigió el commit aabc6596ffb3 ("net: ppp: agregar verificación de límite para datos skb en ppp_sync_txmung") ppp_sync_txmunge() Necesitamos una solución similar en pptp_xmit(); de lo contrario, podríamos leer datos no inicializados como lo informó syzbot. ERROR: KMSAN: uninit-value in pptp_xmit+0xc34/0x2720 drivers/net/ppp/pptp.c:193 pptp_xmit+0xc34/0x2720 drivers/net/ppp/pptp.c:193 ppp_channel_bridge_input drivers/net/ppp/ppp_generic.c:2290 [inline] ppp_input+0x1d6/0xe60 drivers/net/ppp/ppp_generic.c:2314 pppoe_rcv_core+0x1e8/0x760 drivers/net/ppp/pppoe.c:379 sk_backlog_rcv+0x142/0x420 include/net/sock.h:1148 __release_sock+0x1d3/0x330 net/core/sock.c:3213 release_sock+0x6b/0x270 net/core/sock.c:3767 pppoe_sendmsg+0x15d/0xcb0 drivers/net/ppp/pppoe.c:904 sock_sendmsg_nosec net/socket.c:712 [inline] __sock_sendmsg+0x330/0x3d0 net/socket.c:727 ____sys_sendmsg+0x893/0xd80 net/socket.c:2566 ___sys_sendmsg+0x271/0x3b0 net/socket.c:2620 __sys_sendmmsg+0x2d9/0x7c0 net/socket.c:2709

19 Aug 2025, 17:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-08-19 17:15

Updated : 2026-01-09 14:39


NVD link : CVE-2025-38574

Mitre link : CVE-2025-38574

CVE.ORG link : CVE-2025-38574


JSON object : View

Products Affected

debian

  • debian_linux

linux

  • linux_kernel
CWE
CWE-908

Use of Uninitialized Resource