CVE-2025-21639

Source
https://nvd.nist.gov/vuln/detail/CVE-2025-21639
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-21639.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-21639
Downstream
Related
Published
2025-01-19T10:17:56.828Z
Modified
2025-11-27T02:32:09.340170Z
Severity
  • 5.5 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
sctp: sysctl: rto_min/max: avoid using current->nsproxy
Details

In the Linux kernel, the following vulnerability has been resolved:

sctp: sysctl: rto_min/max: avoid using current->nsproxy

As mentioned in a previous commit of this series, using the 'net' structure via 'current' is not recommended for different reasons:

  • Inconsistency: getting info from the reader's/writer's netns vs only from the opener's netns.

  • current->nsproxy can be NULL in some cases, resulting in an 'Oops' (null-ptr-deref), e.g. when the current task is exiting, as spotted by syzbot [1] using acct(2).

The 'net' structure can be obtained from the table->data using container_of().

Note that table->data could also be used directly, as this is the only member needed from the 'net' structure, but that would increase the size of this fix, to use '*data' everywhere 'net->sctp.rto_min/max' is used.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/blob/cc431b3424123d84bcd7afd4de150b33f117a8ef/cves/2025/21xxx/CVE-2025-21639.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
4f3fdf3bc59cafd14c3bc2c2369efad34c7aa8b5
Fixed
c8d179f3b1c1d60bf4484f50aa67b4c70f91bff9
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
4f3fdf3bc59cafd14c3bc2c2369efad34c7aa8b5
Fixed
246428bfb9e7db15c5cd08e1d0eca41b65af2b06
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
4f3fdf3bc59cafd14c3bc2c2369efad34c7aa8b5
Fixed
0f78f09466744589e420935e646ae78212a38290
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
4f3fdf3bc59cafd14c3bc2c2369efad34c7aa8b5
Fixed
4059507e34aa5fe0fa9fd5b2b5f0c8b26ab2d482
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
4f3fdf3bc59cafd14c3bc2c2369efad34c7aa8b5
Fixed
dc9d0e3cfd16f66fbf0862857c6b391c8613ca9f
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
4f3fdf3bc59cafd14c3bc2c2369efad34c7aa8b5
Fixed
c87f1f6ade56c711f8736901e330685b453e420e
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
4f3fdf3bc59cafd14c3bc2c2369efad34c7aa8b5
Fixed
9fc17b76fc70763780aa78b38fcf4742384044a5

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
3.13.0
Fixed
5.4.290
Type
ECOSYSTEM
Events
Introduced
5.5.0
Fixed
5.10.234
Type
ECOSYSTEM
Events
Introduced
5.11.0
Fixed
5.15.177
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
6.1.125
Type
ECOSYSTEM
Events
Introduced
6.2.0
Fixed
6.6.72
Type
ECOSYSTEM
Events
Introduced
6.7.0
Fixed
6.12.10