{"id":"CVE-2025-68787","summary":"netrom: Fix memory leak in nr_sendmsg()","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nnetrom: Fix memory leak in nr_sendmsg()\n\nsyzbot reported a memory leak [1].\n\nWhen function sock_alloc_send_skb() return NULL in nr_output(), the\noriginal skb is not freed, which was allocated in nr_sendmsg(). Fix this\nby freeing it before return.\n\n[1]\nBUG: memory leak\nunreferenced object 0xffff888129f35500 (size 240):\n  comm \"syz.0.17\", pid 6119, jiffies 4294944652\n  hex dump (first 32 bytes):\n    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................\n    00 00 00 00 00 00 00 00 00 10 52 28 81 88 ff ff  ..........R(....\n  backtrace (crc 1456a3e4):\n    kmemleak_alloc_recursive include/linux/kmemleak.h:44 [inline]\n    slab_post_alloc_hook mm/slub.c:4983 [inline]\n    slab_alloc_node mm/slub.c:5288 [inline]\n    kmem_cache_alloc_node_noprof+0x36f/0x5e0 mm/slub.c:5340\n    __alloc_skb+0x203/0x240 net/core/skbuff.c:660\n    alloc_skb include/linux/skbuff.h:1383 [inline]\n    alloc_skb_with_frags+0x69/0x3f0 net/core/skbuff.c:6671\n    sock_alloc_send_pskb+0x379/0x3e0 net/core/sock.c:2965\n    sock_alloc_send_skb include/net/sock.h:1859 [inline]\n    nr_sendmsg+0x287/0x450 net/netrom/af_netrom.c:1105\n    sock_sendmsg_nosec net/socket.c:727 [inline]\n    __sock_sendmsg net/socket.c:742 [inline]\n    sock_write_iter+0x293/0x2a0 net/socket.c:1195\n    new_sync_write fs/read_write.c:593 [inline]\n    vfs_write+0x45d/0x710 fs/read_write.c:686\n    ksys_write+0x143/0x170 fs/read_write.c:738\n    do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]\n    do_syscall_64+0xa4/0xfa0 arch/x86/entry/syscall_64.c:94\n    entry_SYSCALL_64_after_hwframe+0x77/0x7f","modified":"2026-04-02T13:03:49.739085Z","published":"2026-01-13T15:29:00.344Z","related":["MGASA-2026-0017","MGASA-2026-0018"],"database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/68xxx/CVE-2025-68787.json","cna_assigner":"Linux"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/09efbf54eeaecebe882af603c9939a4b1bb9567e"},{"type":"WEB","url":"https://git.kernel.org/stable/c/156a0f6341dce634a825db49ca20b48b1ae9bcc1"},{"type":"WEB","url":"https://git.kernel.org/stable/c/51f5fbc1681bdcffcc7d18bf3dfdb2b1278d3977"},{"type":"WEB","url":"https://git.kernel.org/stable/c/613d12dd794e078be8ff3cf6b62a6b9acf7f4619"},{"type":"WEB","url":"https://git.kernel.org/stable/c/73839497bbde5cd4fd02bbd9c8bc2640780ae65d"},{"type":"WEB","url":"https://git.kernel.org/stable/c/8d1ccba4b171cd504ecfa47349cb9864fc9d687c"},{"type":"WEB","url":"https://git.kernel.org/stable/c/f77e538ac4e3adb1882d5bccb7bfdc111b5963d3"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/68xxx/CVE-2025-68787.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-68787"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"1da177e4c3f41524e886b7f1b8a0c1fc7321cac2"},{"fixed":"f77e538ac4e3adb1882d5bccb7bfdc111b5963d3"},{"fixed":"09efbf54eeaecebe882af603c9939a4b1bb9567e"},{"fixed":"73839497bbde5cd4fd02bbd9c8bc2640780ae65d"},{"fixed":"156a0f6341dce634a825db49ca20b48b1ae9bcc1"},{"fixed":"8d1ccba4b171cd504ecfa47349cb9864fc9d687c"},{"fixed":"51f5fbc1681bdcffcc7d18bf3dfdb2b1278d3977"},{"fixed":"613d12dd794e078be8ff3cf6b62a6b9acf7f4619"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-68787.json"}},{"package":{"name":"Kernel","ecosystem":"Linux"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"2.6.12"},{"fixed":"5.10.248"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.11.0"},{"fixed":"5.15.198"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.16.0"},{"fixed":"6.1.160"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.2.0"},{"fixed":"6.6.120"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.7.0"},{"fixed":"6.12.64"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.13.0"},{"fixed":"6.18.3"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-68787.json"}}],"schema_version":"1.7.5"}