{"id":"CVE-2025-37757","summary":"tipc: fix memory leak in tipc_link_xmit","details":"In the Linux kernel, the following vulnerability has been resolved:\n\ntipc: fix memory leak in tipc_link_xmit\n\nIn case the backlog transmit queue for system-importance messages is overloaded,\ntipc_link_xmit() returns -ENOBUFS but the skb list is not purged. This leads to\nmemory leak and failure when a skb is allocated.\n\nThis commit fixes this issue by purging the skb list before tipc_link_xmit()\nreturns.","modified":"2026-04-02T12:47:27.605121Z","published":"2025-05-01T12:56:01.195Z","related":["SUSE-SU-2025:02249-1","SUSE-SU-2025:02254-1","SUSE-SU-2025:02307-1","SUSE-SU-2025:02333-1","SUSE-SU-2025:02334-1","SUSE-SU-2025:02335-1","SUSE-SU-2025:02538-1","SUSE-SU-2025:02923-1","SUSE-SU-2025:20475-1","SUSE-SU-2025:20483-1","SUSE-SU-2025:20493-1","SUSE-SU-2025:20498-1"],"database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/37xxx/CVE-2025-37757.json","cna_assigner":"Linux"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/09c2dcda2c551bba30710c33f6ac678ae7395389"},{"type":"WEB","url":"https://git.kernel.org/stable/c/24e6280cdd7f8d01fc6b9b365fb800c2fb7ea9bb"},{"type":"WEB","url":"https://git.kernel.org/stable/c/69ae94725f4fc9e75219d2d69022029c5b24bc9a"},{"type":"WEB","url":"https://git.kernel.org/stable/c/7c5957f7905b4aede9d7a559d271438f3ca9e852"},{"type":"WEB","url":"https://git.kernel.org/stable/c/84895f5ce3829d9fc030e5ec2d8729da4c0c9d08"},{"type":"WEB","url":"https://git.kernel.org/stable/c/a40cbfbb8f95c325430f017883da669b2aa927d4"},{"type":"WEB","url":"https://git.kernel.org/stable/c/d0e02d3d27a0b4dcb13f954f537ca1dd8f282dcf"},{"type":"WEB","url":"https://git.kernel.org/stable/c/d4d40e437adb376be16b3a12dd5c63f0fa768247"},{"type":"WEB","url":"https://git.kernel.org/stable/c/ed06675d3b8cd37120b447646d53f7cd3e6fcd63"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/37xxx/CVE-2025-37757.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-37757"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"365ad353c2564bba8835290061308ba825166b3a"},{"fixed":"84895f5ce3829d9fc030e5ec2d8729da4c0c9d08"},{"fixed":"d4d40e437adb376be16b3a12dd5c63f0fa768247"},{"fixed":"ed06675d3b8cd37120b447646d53f7cd3e6fcd63"},{"fixed":"24e6280cdd7f8d01fc6b9b365fb800c2fb7ea9bb"},{"fixed":"09c2dcda2c551bba30710c33f6ac678ae7395389"},{"fixed":"7c5957f7905b4aede9d7a559d271438f3ca9e852"},{"fixed":"d0e02d3d27a0b4dcb13f954f537ca1dd8f282dcf"},{"fixed":"a40cbfbb8f95c325430f017883da669b2aa927d4"},{"fixed":"69ae94725f4fc9e75219d2d69022029c5b24bc9a"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-37757.json"}}],"schema_version":"1.7.5"}