CVE-2025-37757

In the Linux kernel, the following vulnerability has been resolved: tipc: fix memory leak in tipc_link_xmit In case the backlog transmit queue for system-importance messages is overloaded, tipc_link_xmit() returns -ENOBUFS but the skb list is not purged. This leads to memory leak and failure when a skb is allocated. This commit fixes this issue by purging the skb list before tipc_link_xmit() returns.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.15:rc1:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*

History

04 Nov 2025, 18:00

Type Values Removed Values Added
First Time Linux linux Kernel
Debian debian Linux
Linux
Debian
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
CPE cpe:2.3:o:linux:linux_kernel:6.15:rc1:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
CWE CWE-401
References () https://git.kernel.org/stable/c/09c2dcda2c551bba30710c33f6ac678ae7395389 - () https://git.kernel.org/stable/c/09c2dcda2c551bba30710c33f6ac678ae7395389 - Patch
References () https://git.kernel.org/stable/c/24e6280cdd7f8d01fc6b9b365fb800c2fb7ea9bb - () https://git.kernel.org/stable/c/24e6280cdd7f8d01fc6b9b365fb800c2fb7ea9bb - Patch
References () https://git.kernel.org/stable/c/69ae94725f4fc9e75219d2d69022029c5b24bc9a - () https://git.kernel.org/stable/c/69ae94725f4fc9e75219d2d69022029c5b24bc9a - Patch
References () https://git.kernel.org/stable/c/7c5957f7905b4aede9d7a559d271438f3ca9e852 - () https://git.kernel.org/stable/c/7c5957f7905b4aede9d7a559d271438f3ca9e852 - Patch
References () https://git.kernel.org/stable/c/84895f5ce3829d9fc030e5ec2d8729da4c0c9d08 - () https://git.kernel.org/stable/c/84895f5ce3829d9fc030e5ec2d8729da4c0c9d08 - Patch
References () https://git.kernel.org/stable/c/a40cbfbb8f95c325430f017883da669b2aa927d4 - () https://git.kernel.org/stable/c/a40cbfbb8f95c325430f017883da669b2aa927d4 - Patch
References () https://git.kernel.org/stable/c/d0e02d3d27a0b4dcb13f954f537ca1dd8f282dcf - () https://git.kernel.org/stable/c/d0e02d3d27a0b4dcb13f954f537ca1dd8f282dcf - Patch
References () https://git.kernel.org/stable/c/d4d40e437adb376be16b3a12dd5c63f0fa768247 - () https://git.kernel.org/stable/c/d4d40e437adb376be16b3a12dd5c63f0fa768247 - Patch
References () https://git.kernel.org/stable/c/ed06675d3b8cd37120b447646d53f7cd3e6fcd63 - () https://git.kernel.org/stable/c/ed06675d3b8cd37120b447646d53f7cd3e6fcd63 - Patch
References () https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html - () https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html - Mailing List
References () https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html - () https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html - Mailing List

03 Nov 2025, 20:18

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html -
  • () https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html -

02 May 2025, 13:53

Type Values Removed Values Added
New CVE

Information

Published : 2025-05-01 13:15

Updated : 2025-11-04 18:00


NVD link : CVE-2025-37757

Mitre link : CVE-2025-37757

CVE.ORG link : CVE-2025-37757


JSON object : View

Products Affected

linux

  • linux_kernel

debian

  • debian_linux
CWE
CWE-401

Missing Release of Memory after Effective Lifetime