5.5
CVE-2025-21638
- EPSS 0.06%
- Veröffentlicht 19.01.2025 11:15:09
- Zuletzt bearbeitet 03.11.2025 21:18:59
- Quelle 416baaa9-dc9f-4396-8d5f-8c081f
- CVE-Watchlists
- Unerledigt
In the Linux kernel, the following vulnerability has been resolved: sctp: sysctl: auth_enable: avoid using current->nsproxy As mentioned in a previous commit of this series, using the 'net' structure via 'current' is not recommended for different reasons: - Inconsistency: getting info from the reader's/writer's netns vs only from the opener's netns. - current->nsproxy can be NULL in some cases, resulting in an 'Oops' (null-ptr-deref), e.g. when the current task is exiting, as spotted by syzbot [1] using acct(2). The 'net' structure can be obtained from the table->data using container_of(). Note that table->data could also be used directly, but that would increase the size of this fix, while 'sctp.ctl_sock' still needs to be retrieved from 'net' structure.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Linux ≫ Linux Kernel Version >= 3.10.41 < 3.11
Linux ≫ Linux Kernel Version >= 3.12.20 < 3.13
Linux ≫ Linux Kernel Version >= 3.14.5 < 5.4.290
Linux ≫ Linux Kernel Version >= 5.5 < 5.10.234
Linux ≫ Linux Kernel Version >= 5.11 < 5.15.177
Linux ≫ Linux Kernel Version >= 5.16 < 6.1.125
Linux ≫ Linux Kernel Version >= 6.2 < 6.6.72
Linux ≫ Linux Kernel Version >= 6.7 < 6.12.10
Linux ≫ Linux Kernel Version6.13 Updaterc1
Linux ≫ Linux Kernel Version6.13 Updaterc2
Linux ≫ Linux Kernel Version6.13 Updaterc3
Linux ≫ Linux Kernel Version6.13 Updaterc4
Linux ≫ Linux Kernel Version6.13 Updaterc5
Linux ≫ Linux Kernel Version6.13 Updaterc6
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.06% | 0.19 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 5.5 | 1.8 | 3.6 |
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
|
CWE-476 NULL Pointer Dereference
The product dereferences a pointer that it expects to be valid but is NULL.