CVE-2025-39812
Gravedad CVSS v3.1:
MEDIA
Tipo:
No Disponible / Otro tipo
Fecha de publicación:
16/09/2025
Última modificación:
16/01/2026
Descripción
*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
sctp: initialize more fields in sctp_v6_from_sk()<br />
<br />
syzbot found that sin6_scope_id was not properly initialized,<br />
leading to undefined behavior.<br />
<br />
Clear sin6_scope_id and sin6_flowinfo.<br />
<br />
BUG: KMSAN: uninit-value in __sctp_v6_cmp_addr+0x887/0x8c0 net/sctp/ipv6.c:649<br />
__sctp_v6_cmp_addr+0x887/0x8c0 net/sctp/ipv6.c:649<br />
sctp_inet6_cmp_addr+0x4f2/0x510 net/sctp/ipv6.c:983<br />
sctp_bind_addr_conflict+0x22a/0x3b0 net/sctp/bind_addr.c:390<br />
sctp_get_port_local+0x21eb/0x2440 net/sctp/socket.c:8452<br />
sctp_get_port net/sctp/socket.c:8523 [inline]<br />
sctp_listen_start net/sctp/socket.c:8567 [inline]<br />
sctp_inet_listen+0x710/0xfd0 net/sctp/socket.c:8636<br />
__sys_listen_socket net/socket.c:1912 [inline]<br />
__sys_listen net/socket.c:1927 [inline]<br />
__do_sys_listen net/socket.c:1932 [inline]<br />
__se_sys_listen net/socket.c:1930 [inline]<br />
__x64_sys_listen+0x343/0x4c0 net/socket.c:1930<br />
x64_sys_call+0x271d/0x3e20 arch/x86/include/generated/asm/syscalls_64.h:51<br />
do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]<br />
do_syscall_64+0xd9/0x210 arch/x86/entry/syscall_64.c:94<br />
entry_SYSCALL_64_after_hwframe+0x77/0x7f<br />
<br />
Local variable addr.i.i created at:<br />
sctp_get_port net/sctp/socket.c:8515 [inline]<br />
sctp_listen_start net/sctp/socket.c:8567 [inline]<br />
sctp_inet_listen+0x650/0xfd0 net/sctp/socket.c:8636<br />
__sys_listen_socket net/socket.c:1912 [inline]<br />
__sys_listen net/socket.c:1927 [inline]<br />
__do_sys_listen net/socket.c:1932 [inline]<br />
__se_sys_listen net/socket.c:1930 [inline]<br />
__x64_sys_listen+0x343/0x4c0 net/socket.c:1930
Impacto
Puntuación base 3.x
5.50
Gravedad 3.x
MEDIA
Productos y versiones vulnerables
| CPE | Desde | Hasta |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 2.6.12.1 (incluyendo) | 5.4.298 (excluyendo) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.5 (incluyendo) | 5.10.242 (excluyendo) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.11 (incluyendo) | 5.15.191 (excluyendo) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (incluyendo) | 6.1.150 (excluyendo) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (incluyendo) | 6.6.104 (excluyendo) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (incluyendo) | 6.12.45 (excluyendo) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.13 (incluyendo) | 6.16.5 (excluyendo) |
| cpe:2.3:o:linux:linux_kernel:2.6.12:-:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:2.6.12:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:2.6.12:rc3:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:2.6.12:rc4:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:2.6.12:rc5:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.17:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.17:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.17:rc3:*:*:*:*:*:* |
Para consultar la lista completa de nombres de CPE con productos y versiones, ver esta página
Referencias a soluciones, herramientas e información
- https://git.kernel.org/stable/c/17d6c7747045e9b802c2f5dfaba260d309d831ae
- https://git.kernel.org/stable/c/1bbc0c02aea1f1c405bd1271466889c25a1fe01b
- https://git.kernel.org/stable/c/2e8750469242cad8f01f320131fd5a6f540dbb99
- https://git.kernel.org/stable/c/45e4b36593edffb7bbee5828ae820bc10a9fa0f3
- https://git.kernel.org/stable/c/463aa96fca6209bb205f49f7deea3817d7ddaa3a
- https://git.kernel.org/stable/c/65b4693d8bab5370cfcb44a275b4d8dcb06e56bf
- https://git.kernel.org/stable/c/9546934c2054bba1bd605c44e936619159a34027
- https://git.kernel.org/stable/c/f6c2cc99fc2387ba6499facd6108f6543382792d
- https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html
- https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html



