๐Ÿ” CVE Alert

CVE-2025-21639

MEDIUM 5.5

sctp: sysctl: rto_min/max: avoid using current->nsproxy

CVSS Score
5.5
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: sctp: sysctl: rto_min/max: avoid using current->nsproxy As mentioned in a previous commit of this series, using the 'net' structure via 'current' is not recommended for different reasons: - Inconsistency: getting info from the reader's/writer's netns vs only from the opener's netns. - current->nsproxy can be NULL in some cases, resulting in an 'Oops' (null-ptr-deref), e.g. when the current task is exiting, as spotted by syzbot [1] using acct(2). The 'net' structure can be obtained from the table->data using container_of(). Note that table->data could also be used directly, as this is the only member needed from the 'net' structure, but that would increase the size of this fix, to use '*data' everywhere 'net->sctp.rto_min/max' is used.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Jan 19, 2025
Last Updated May 12, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new medium vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
4f3fdf3bc59cafd14c3bc2c2369efad34c7aa8b5 < c8d179f3b1c1d60bf4484f50aa67b4c70f91bff9 4f3fdf3bc59cafd14c3bc2c2369efad34c7aa8b5 < 246428bfb9e7db15c5cd08e1d0eca41b65af2b06 4f3fdf3bc59cafd14c3bc2c2369efad34c7aa8b5 < 0f78f09466744589e420935e646ae78212a38290 4f3fdf3bc59cafd14c3bc2c2369efad34c7aa8b5 < 4059507e34aa5fe0fa9fd5b2b5f0c8b26ab2d482 4f3fdf3bc59cafd14c3bc2c2369efad34c7aa8b5 < dc9d0e3cfd16f66fbf0862857c6b391c8613ca9f 4f3fdf3bc59cafd14c3bc2c2369efad34c7aa8b5 < c87f1f6ade56c711f8736901e330685b453e420e 4f3fdf3bc59cafd14c3bc2c2369efad34c7aa8b5 < 9fc17b76fc70763780aa78b38fcf4742384044a5
Linux / Linux
3.13

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/c8d179f3b1c1d60bf4484f50aa67b4c70f91bff9 git.kernel.org: https://git.kernel.org/stable/c/246428bfb9e7db15c5cd08e1d0eca41b65af2b06 git.kernel.org: https://git.kernel.org/stable/c/0f78f09466744589e420935e646ae78212a38290 git.kernel.org: https://git.kernel.org/stable/c/4059507e34aa5fe0fa9fd5b2b5f0c8b26ab2d482 git.kernel.org: https://git.kernel.org/stable/c/dc9d0e3cfd16f66fbf0862857c6b391c8613ca9f git.kernel.org: https://git.kernel.org/stable/c/c87f1f6ade56c711f8736901e330685b453e420e git.kernel.org: https://git.kernel.org/stable/c/9fc17b76fc70763780aa78b38fcf4742384044a5 lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/03/msg00001.html lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/03/msg00002.html cert-portal.siemens.com: https://cert-portal.siemens.com/productcert/html/ssa-265688.html