CVE-2025-21637
Severity CVSS v4.0:
Pending analysis
Type:
CWE-476
NULL Pointer Dereference
Publication date:
19/01/2025
Last modified:
27/02/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
sctp: sysctl: udp_port: avoid using current->nsproxy<br />
<br />
As mentioned in a previous commit of this series, using the &#39;net&#39;<br />
structure via &#39;current&#39; is not recommended for different reasons:<br />
<br />
- Inconsistency: getting info from the reader&#39;s/writer&#39;s netns vs only<br />
from the opener&#39;s netns.<br />
<br />
- current->nsproxy can be NULL in some cases, resulting in an &#39;Oops&#39;<br />
(null-ptr-deref), e.g. when the current task is exiting, as spotted by<br />
syzbot [1] using acct(2).<br />
<br />
The &#39;net&#39; structure can be obtained from the table->data using<br />
container_of().<br />
<br />
Note that table->data could also be used directly, but that would<br />
increase the size of this fix, while &#39;sctp.ctl_sock&#39; still needs to be<br />
retrieved from &#39;net&#39; structure.
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.11 (including) | 5.15.177 (excluding) |
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (including) | 6.1.125 (excluding) |
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.6.72 (excluding) |
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.12.10 (excluding) |
cpe:2.3:o:linux:linux_kernel:6.13:rc1:*:*:*:*:*:* | ||
cpe:2.3:o:linux:linux_kernel:6.13:rc2:*:*:*:*:*:* | ||
cpe:2.3:o:linux:linux_kernel:6.13:rc3:*:*:*:*:*:* | ||
cpe:2.3:o:linux:linux_kernel:6.13:rc4:*:*:*:*:*:* | ||
cpe:2.3:o:linux:linux_kernel:6.13:rc5:*:*:*:*:*:* | ||
cpe:2.3:o:linux:linux_kernel:6.13:rc6:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/0a0966312ac3eedd7f5f2a766ed4702df39a9a65
- https://git.kernel.org/stable/c/55627918febdf9d71107a1e68d1528dc591c9a15
- https://git.kernel.org/stable/c/5b77d73f3be5102720fb685b9e6900e3500e1096
- https://git.kernel.org/stable/c/c10377bbc1972d858eaf0ab366a311b39f8ef1b6
- https://git.kernel.org/stable/c/e919197fb8616331f5dc81e4c3cc3d12769cb725