CVE-2025-21636

Source
https://nvd.nist.gov/vuln/detail/CVE-2025-21636
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-21636.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-21636
Downstream
Related
Published
2025-01-19T10:17:54.576Z
Modified
2025-11-28T02:35:15.743195Z
Severity
  • 5.5 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
sctp: sysctl: plpmtud_probe_interval: avoid using current->nsproxy
Details

In the Linux kernel, the following vulnerability has been resolved:

sctp: sysctl: plpmtudprobeinterval: avoid using current->nsproxy

As mentioned in a previous commit of this series, using the 'net' structure via 'current' is not recommended for different reasons:

  • Inconsistency: getting info from the reader's/writer's netns vs only from the opener's netns.

  • current->nsproxy can be NULL in some cases, resulting in an 'Oops' (null-ptr-deref), e.g. when the current task is exiting, as spotted by syzbot [1] using acct(2).

The 'net' structure can be obtained from the table->data using container_of().

Note that table->data could also be used directly, as this is the only member needed from the 'net' structure, but that would increase the size of this fix, to use '*data' everywhere 'net->sctp.probe_interval' is used.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/21xxx/CVE-2025-21636.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
d1e462a7a5f359cbb9a0e8fbfafcfb6657034105
Fixed
1dc5da6c4178f3e4b95c631418f72de9f86c0449
Fixed
44ee8635922b6eb940faddb961a8347c6857d722
Fixed
284a221f8fa503628432c7bb5108277c688c6ffa
Fixed
bcf8c60074e81ed2ac2d35130917175a3949c917
Fixed
6259d2484d0ceff42245d1f09cc8cb6ee72d847a

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
5.14.0
Fixed
5.15.177
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
6.1.125
Type
ECOSYSTEM
Events
Introduced
6.2.0
Fixed
6.6.72
Type
ECOSYSTEM
Events
Introduced
6.7.0
Fixed
6.12.10