In the Linux kernel, the following vulnerability has been resolved:
sctp: sysctl: plpmtudprobeinterval: avoid using current->nsproxy
As mentioned in a previous commit of this series, using the 'net' structure via 'current' is not recommended for different reasons:
Inconsistency: getting info from the reader's/writer's netns vs only from the opener's netns.
current->nsproxy can be NULL in some cases, resulting in an 'Oops' (null-ptr-deref), e.g. when the current task is exiting, as spotted by syzbot [1] using acct(2).
The 'net' structure can be obtained from the table->data using container_of().
Note that table->data could also be used directly, as this is the only member needed from the 'net' structure, but that would increase the size of this fix, to use '*data' everywhere 'net->sctp.probe_interval' is used.
[
{
"id": "CVE-2025-21636-33025f78",
"signature_version": "v1",
"digest": {
"threshold": 0.9,
"line_hashes": [
"216916966690141745720632906197441279530",
"243949712008030359587054450774618173244",
"72698611781328680917625553865557252287",
"212028416954249640841129708156434523252"
]
},
"deprecated": false,
"signature_type": "Line",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@284a221f8fa503628432c7bb5108277c688c6ffa",
"target": {
"file": "net/sctp/sysctl.c"
}
},
{
"id": "CVE-2025-21636-40e31d2f",
"signature_version": "v1",
"digest": {
"length": 549.0,
"function_hash": "25981170557515103793573548025224803331"
},
"deprecated": false,
"signature_type": "Function",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@284a221f8fa503628432c7bb5108277c688c6ffa",
"target": {
"file": "net/sctp/sysctl.c",
"function": "proc_sctp_do_probe_interval"
}
},
{
"id": "CVE-2025-21636-4a90eb46",
"signature_version": "v1",
"digest": {
"threshold": 0.9,
"line_hashes": [
"232775897100814750096054166652358882043",
"243949712008030359587054450774618173244",
"72698611781328680917625553865557252287",
"212028416954249640841129708156434523252"
]
},
"deprecated": false,
"signature_type": "Line",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@bcf8c60074e81ed2ac2d35130917175a3949c917",
"target": {
"file": "net/sctp/sysctl.c"
}
},
{
"id": "CVE-2025-21636-6d37b525",
"signature_version": "v1",
"digest": {
"length": 549.0,
"function_hash": "25981170557515103793573548025224803331"
},
"deprecated": false,
"signature_type": "Function",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@44ee8635922b6eb940faddb961a8347c6857d722",
"target": {
"file": "net/sctp/sysctl.c",
"function": "proc_sctp_do_probe_interval"
}
},
{
"id": "CVE-2025-21636-90f6cc6a",
"signature_version": "v1",
"digest": {
"length": 555.0,
"function_hash": "135454892733392278868883756908173792096"
},
"deprecated": false,
"signature_type": "Function",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@bcf8c60074e81ed2ac2d35130917175a3949c917",
"target": {
"file": "net/sctp/sysctl.c",
"function": "proc_sctp_do_probe_interval"
}
},
{
"id": "CVE-2025-21636-b9a1f40a",
"signature_version": "v1",
"digest": {
"threshold": 0.9,
"line_hashes": [
"216916966690141745720632906197441279530",
"243949712008030359587054450774618173244",
"72698611781328680917625553865557252287",
"212028416954249640841129708156434523252"
]
},
"deprecated": false,
"signature_type": "Line",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@44ee8635922b6eb940faddb961a8347c6857d722",
"target": {
"file": "net/sctp/sysctl.c"
}
}
]