Executive Summary

Informations
Name CVE-2025-21638 First vendor Publication 2025-01-19
Vendor Cve Last vendor Modification 2025-04-10

Security-Database Scoring CVSS v3

Cvss vector : CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Overall CVSS Score 5.5
Base Score 5.5 Environmental Score 5.5
impact SubScore 3.6 Temporal Score 5.5
Exploitabality Sub Score 1.8
 
Attack Vector Local Attack Complexity Low
Privileges Required Low User Interaction None
Scope Unchanged Confidentiality Impact None
Integrity Impact None Availability Impact High
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector :
Cvss Base Score N/A Attack Range N/A
Cvss Impact Score N/A Attack Complexity N/A
Cvss Expoit Score N/A Authentication N/A
Calculate full CVSS 2.0 Vectors scores

Detail

In the Linux kernel, the following vulnerability has been resolved:

sctp: sysctl: auth_enable: avoid using current->nsproxy

As mentioned in a previous commit of this series, using the 'net' structure via 'current' is not recommended for different reasons:

- Inconsistency: getting info from the reader's/writer's netns vs only
from the opener's netns.

- current->nsproxy can be NULL in some cases, resulting in an 'Oops'
(null-ptr-deref), e.g. when the current task is exiting, as spotted by
syzbot [1] using acct(2).

The 'net' structure can be obtained from the table->data using container_of().

Note that table->data could also be used directly, but that would increase the size of this fix, while 'sctp.ctl_sock' still needs to be retrieved from 'net' structure.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21638

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-476 NULL Pointer Dereference

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 8
Os 3708

Sources (Detail)

https://git.kernel.org/stable/c/15649fd5415eda664ef35780c2013adeb5d9c695
https://git.kernel.org/stable/c/1b67030d39f2b00f94ac1f0af11ba6657589e4d3
https://git.kernel.org/stable/c/7ec30c54f339c640aa7e49d7e9f7bbed6bd42bf6
https://git.kernel.org/stable/c/bd2a2939423566c654545fa3e96a656662a0af9e
https://git.kernel.org/stable/c/c184bc621e3cef03ac9ba81a50dda2dae6a21d36
https://git.kernel.org/stable/c/cf387cdebfaebae228dfba162f94c567a67610c3
https://git.kernel.org/stable/c/dc583e7e5f8515ca489c0df28e4362a70eade382
Source Url

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
Date Informations
2025-06-26 02:40:45
  • Multiple Updates
2025-06-25 12:37:48
  • Multiple Updates
2025-06-24 02:45:13
  • Multiple Updates
2025-05-27 02:52:09
  • Multiple Updates
2025-03-29 03:46:19
  • Multiple Updates
2025-03-28 13:48:48
  • Multiple Updates
2025-03-28 03:24:04
  • Multiple Updates
2025-03-25 03:29:59
  • Multiple Updates
2025-03-19 03:18:34
  • Multiple Updates
2025-03-18 03:31:32
  • Multiple Updates
2025-03-14 03:18:35
  • Multiple Updates
2025-03-06 14:15:06
  • Multiple Updates
2025-03-06 03:09:28
  • Multiple Updates
2025-02-28 00:20:51
  • Multiple Updates
2025-02-02 17:20:38
  • Multiple Updates
2025-01-23 21:20:32
  • Multiple Updates
2025-01-19 17:20:28
  • First insertion