In the Linux kernel, the following vulnerability has been resolved:
rds: sysctl: rdstcp{rcv,snd}buf: avoid using current->nsproxy
As mentioned in a previous commit of this series, using the 'net' structure via 'current' is not recommended for different reasons:
Inconsistency: getting info from the reader's/writer's netns vs only from the opener's netns.
current->nsproxy can be NULL in some cases, resulting in an 'Oops' (null-ptr-deref), e.g. when the current task is exiting, as spotted by syzbot [1] using acct(2).
The per-netns structure can be obtained from the table->data using container_of(), then the 'net' one can be retrieved from the listen socket (if available).
[
{
"deprecated": false,
"target": {
"file": "net/rds/tcp.c",
"function": "rds_tcp_skbuf_handler"
},
"digest": {
"length": 386.0,
"function_hash": "312320362453694658386107230546767687242"
},
"id": "CVE-2025-21635-4da20bb8",
"signature_type": "Function",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@de8d6de0ee27be4b2b1e5b06f04aeacbabbba492",
"signature_version": "v1"
},
{
"deprecated": false,
"target": {
"file": "net/rds/tcp.c"
},
"digest": {
"threshold": 0.9,
"line_hashes": [
"333554569408687242921905602980014034846",
"190852571476232347192388940398070133679",
"293919398987717265821050620018403638849",
"255991076023874336520003374892836697514",
"194787087550436736357083294354093870871",
"182185628882389527917290378205810685164",
"225018768201946305264415148144808756208",
"328742061120149465258250159625476671827",
"169936718612768225066100801374309176647",
"125716843465587913708617796049677445181",
"146448964818662596277719306320173687040",
"156642849605871421778113711218776733903",
"251740743489006683585418902766141195780",
"108955486365209584529671621846936174733",
"115619642438417557888073298825657787823",
"241689367494952248522779060295799985935",
"38856965404921746195895257492600033085",
"22673144939498229035238303276241928028",
"188403071513714430779905994358195027405",
"164935636517332690129050509192491647104",
"28475868560321831757228323465303456554",
"284570275433632660470918712513013736160",
"177393763018978374988864231759520863986",
"46254800748106001222418638208318395764",
"292813732548225252992474303989241679808",
"31233752931491725184380303063510862353",
"144827552376462275255292993010044308757"
]
},
"id": "CVE-2025-21635-6398ff0d",
"signature_type": "Line",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@7f5611cbc4871c7fb1ad36c2e5a9edad63dca95c",
"signature_version": "v1"
},
{
"deprecated": false,
"target": {
"file": "net/rds/tcp.c"
},
"digest": {
"threshold": 0.9,
"line_hashes": [
"333554569408687242921905602980014034846",
"190852571476232347192388940398070133679",
"293919398987717265821050620018403638849",
"255991076023874336520003374892836697514",
"194787087550436736357083294354093870871",
"182185628882389527917290378205810685164",
"225018768201946305264415148144808756208",
"328742061120149465258250159625476671827",
"169936718612768225066100801374309176647",
"125716843465587913708617796049677445181",
"146448964818662596277719306320173687040",
"156642849605871421778113711218776733903",
"251740743489006683585418902766141195780",
"108955486365209584529671621846936174733",
"115619642438417557888073298825657787823",
"241689367494952248522779060295799985935",
"38856965404921746195895257492600033085",
"22673144939498229035238303276241928028",
"188403071513714430779905994358195027405",
"164935636517332690129050509192491647104",
"28475868560321831757228323465303456554",
"284570275433632660470918712513013736160",
"177393763018978374988864231759520863986",
"46254800748106001222418638208318395764",
"292813732548225252992474303989241679808",
"31233752931491725184380303063510862353",
"144827552376462275255292993010044308757"
]
},
"id": "CVE-2025-21635-6eb9c1d7",
"signature_type": "Line",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@de8d6de0ee27be4b2b1e5b06f04aeacbabbba492",
"signature_version": "v1"
},
{
"deprecated": false,
"target": {
"file": "net/rds/tcp.c",
"function": "rds_tcp_skbuf_handler"
},
"digest": {
"length": 386.0,
"function_hash": "312320362453694658386107230546767687242"
},
"id": "CVE-2025-21635-f4153fc2",
"signature_type": "Function",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@7f5611cbc4871c7fb1ad36c2e5a9edad63dca95c",
"signature_version": "v1"
}
]