๐Ÿ” CVE Alert

CVE-2025-21636

MEDIUM 5.5

sctp: sysctl: plpmtud_probe_interval: avoid using current->nsproxy

CVSS Score
5.5
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: sctp: sysctl: plpmtud_probe_interval: avoid using current->nsproxy As mentioned in a previous commit of this series, using the 'net' structure via 'current' is not recommended for different reasons: - Inconsistency: getting info from the reader's/writer's netns vs only from the opener's netns. - current->nsproxy can be NULL in some cases, resulting in an 'Oops' (null-ptr-deref), e.g. when the current task is exiting, as spotted by syzbot [1] using acct(2). The 'net' structure can be obtained from the table->data using container_of(). Note that table->data could also be used directly, as this is the only member needed from the 'net' structure, but that would increase the size of this fix, to use '*data' everywhere 'net->sctp.probe_interval' is used.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Jan 19, 2025
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new medium vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
d1e462a7a5f359cbb9a0e8fbfafcfb6657034105 < 1dc5da6c4178f3e4b95c631418f72de9f86c0449 d1e462a7a5f359cbb9a0e8fbfafcfb6657034105 < 44ee8635922b6eb940faddb961a8347c6857d722 d1e462a7a5f359cbb9a0e8fbfafcfb6657034105 < 284a221f8fa503628432c7bb5108277c688c6ffa d1e462a7a5f359cbb9a0e8fbfafcfb6657034105 < bcf8c60074e81ed2ac2d35130917175a3949c917 d1e462a7a5f359cbb9a0e8fbfafcfb6657034105 < 6259d2484d0ceff42245d1f09cc8cb6ee72d847a
Linux / Linux
5.14

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/1dc5da6c4178f3e4b95c631418f72de9f86c0449 git.kernel.org: https://git.kernel.org/stable/c/44ee8635922b6eb940faddb961a8347c6857d722 git.kernel.org: https://git.kernel.org/stable/c/284a221f8fa503628432c7bb5108277c688c6ffa git.kernel.org: https://git.kernel.org/stable/c/bcf8c60074e81ed2ac2d35130917175a3949c917 git.kernel.org: https://git.kernel.org/stable/c/6259d2484d0ceff42245d1f09cc8cb6ee72d847a lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/03/msg00001.html