In the Linux kernel, the following vulnerability has been resolved:
sctp: sysctl: udp_port: avoid using current->nsproxy
As mentioned in a previous commit of this series, using the 'net' structure via 'current' is not recommended for different reasons:
Inconsistency: getting info from the reader's/writer's netns vs only from the opener's netns.
current->nsproxy can be NULL in some cases, resulting in an 'Oops' (null-ptr-deref), e.g. when the current task is exiting, as spotted by syzbot [1] using acct(2).
The 'net' structure can be obtained from the table->data using container_of().
Note that table->data could also be used directly, but that would increase the size of this fix, while 'sctp.ctl_sock' still needs to be retrieved from 'net' structure.
[
{
"deprecated": false,
"signature_version": "v1",
"digest": {
"length": 895.0,
"function_hash": "286946952922464540248545808764317024095"
},
"id": "CVE-2025-21637-05023e2b",
"signature_type": "Function",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@55627918febdf9d71107a1e68d1528dc591c9a15",
"target": {
"file": "net/sctp/sysctl.c",
"function": "proc_sctp_do_udp_port"
}
},
{
"deprecated": false,
"signature_version": "v1",
"digest": {
"length": 901.0,
"function_hash": "174525864340215859941841950120001617476"
},
"id": "CVE-2025-21637-6bf91750",
"signature_type": "Function",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@5b77d73f3be5102720fb685b9e6900e3500e1096",
"target": {
"file": "net/sctp/sysctl.c",
"function": "proc_sctp_do_udp_port"
}
},
{
"deprecated": false,
"signature_version": "v1",
"digest": {
"threshold": 0.9,
"line_hashes": [
"166698554015113720482140462031066726452",
"129699619617276911942727382026611734405",
"228207266622273123105615731316132703667",
"264903463837802912894567840950525975930"
]
},
"id": "CVE-2025-21637-706b3a84",
"signature_type": "Line",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@c10377bbc1972d858eaf0ab366a311b39f8ef1b6",
"target": {
"file": "net/sctp/sysctl.c"
}
},
{
"deprecated": false,
"signature_version": "v1",
"digest": {
"threshold": 0.9,
"line_hashes": [
"50806525143353621062177558880508938125",
"129699619617276911942727382026611734405",
"228207266622273123105615731316132703667",
"264903463837802912894567840950525975930"
]
},
"id": "CVE-2025-21637-70fd46b7",
"signature_type": "Line",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@0a0966312ac3eedd7f5f2a766ed4702df39a9a65",
"target": {
"file": "net/sctp/sysctl.c"
}
},
{
"deprecated": false,
"signature_version": "v1",
"digest": {
"length": 895.0,
"function_hash": "286946952922464540248545808764317024095"
},
"id": "CVE-2025-21637-7ae495df",
"signature_type": "Function",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@0a0966312ac3eedd7f5f2a766ed4702df39a9a65",
"target": {
"file": "net/sctp/sysctl.c",
"function": "proc_sctp_do_udp_port"
}
},
{
"deprecated": false,
"signature_version": "v1",
"digest": {
"threshold": 0.9,
"line_hashes": [
"166698554015113720482140462031066726452",
"129699619617276911942727382026611734405",
"228207266622273123105615731316132703667",
"264903463837802912894567840950525975930"
]
},
"id": "CVE-2025-21637-901530c3",
"signature_type": "Line",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@5b77d73f3be5102720fb685b9e6900e3500e1096",
"target": {
"file": "net/sctp/sysctl.c"
}
},
{
"deprecated": false,
"signature_version": "v1",
"digest": {
"length": 901.0,
"function_hash": "174525864340215859941841950120001617476"
},
"id": "CVE-2025-21637-d7b7543d",
"signature_type": "Function",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@c10377bbc1972d858eaf0ab366a311b39f8ef1b6",
"target": {
"file": "net/sctp/sysctl.c",
"function": "proc_sctp_do_udp_port"
}
},
{
"deprecated": false,
"signature_version": "v1",
"digest": {
"threshold": 0.9,
"line_hashes": [
"50806525143353621062177558880508938125",
"129699619617276911942727382026611734405",
"228207266622273123105615731316132703667",
"264903463837802912894567840950525975930"
]
},
"id": "CVE-2025-21637-e82d6b2b",
"signature_type": "Line",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@55627918febdf9d71107a1e68d1528dc591c9a15",
"target": {
"file": "net/sctp/sysctl.c"
}
}
]