In the Linux kernel, the following vulnerability has been resolved:
sctp: sysctl: rto_min/max: avoid using current->nsproxy
As mentioned in a previous commit of this series, using the 'net' structure via 'current' is not recommended for different reasons:
Inconsistency: getting info from the reader's/writer's netns vs only from the opener's netns.
current->nsproxy can be NULL in some cases, resulting in an 'Oops' (null-ptr-deref), e.g. when the current task is exiting, as spotted by syzbot [1] using acct(2).
The 'net' structure can be obtained from the table->data using container_of().
Note that table->data could also be used directly, as this is the only member needed from the 'net' structure, but that would increase the size of this fix, to use '*data' everywhere 'net->sctp.rto_min/max' is used.
[
{
"signature_type": "Function",
"deprecated": false,
"digest": {
"length": 648.0,
"function_hash": "57437289794813408019289441107982835338"
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@246428bfb9e7db15c5cd08e1d0eca41b65af2b06",
"target": {
"file": "net/sctp/sysctl.c",
"function": "proc_sctp_do_rto_max"
},
"id": "CVE-2025-21639-343dbe58"
},
{
"signature_type": "Line",
"deprecated": false,
"digest": {
"line_hashes": [
"89782128404083306338152724177369960065",
"129699619617276911942727382026611734405",
"228207266622273123105615731316132703667",
"264903463837802912894567840950525975930",
"200885080256235266534023528527081164533",
"129699619617276911942727382026611734405",
"228207266622273123105615731316132703667",
"264903463837802912894567840950525975930"
],
"threshold": 0.9
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@9fc17b76fc70763780aa78b38fcf4742384044a5",
"target": {
"file": "net/sctp/sysctl.c"
},
"id": "CVE-2025-21639-3d8fca45"
},
{
"signature_type": "Function",
"deprecated": false,
"digest": {
"length": 648.0,
"function_hash": "57437289794813408019289441107982835338"
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@c8d179f3b1c1d60bf4484f50aa67b4c70f91bff9",
"target": {
"file": "net/sctp/sysctl.c",
"function": "proc_sctp_do_rto_max"
},
"id": "CVE-2025-21639-41abc4e4"
},
{
"signature_type": "Function",
"deprecated": false,
"digest": {
"length": 648.0,
"function_hash": "57437289794813408019289441107982835338"
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@4059507e34aa5fe0fa9fd5b2b5f0c8b26ab2d482",
"target": {
"file": "net/sctp/sysctl.c",
"function": "proc_sctp_do_rto_max"
},
"id": "CVE-2025-21639-4938b792"
},
{
"signature_type": "Function",
"deprecated": false,
"digest": {
"length": 654.0,
"function_hash": "66647506635892141314960249203232550563"
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@c87f1f6ade56c711f8736901e330685b453e420e",
"target": {
"file": "net/sctp/sysctl.c",
"function": "proc_sctp_do_rto_min"
},
"id": "CVE-2025-21639-4bddd539"
},
{
"signature_type": "Line",
"deprecated": false,
"digest": {
"line_hashes": [
"198321148514104770370812398812262919908",
"129699619617276911942727382026611734405",
"228207266622273123105615731316132703667",
"264903463837802912894567840950525975930",
"53836062129814137040273743021815151529",
"129699619617276911942727382026611734405",
"228207266622273123105615731316132703667",
"264903463837802912894567840950525975930"
],
"threshold": 0.9
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@4059507e34aa5fe0fa9fd5b2b5f0c8b26ab2d482",
"target": {
"file": "net/sctp/sysctl.c"
},
"id": "CVE-2025-21639-5dda60df"
},
{
"signature_type": "Line",
"deprecated": false,
"digest": {
"line_hashes": [
"89782128404083306338152724177369960065",
"129699619617276911942727382026611734405",
"228207266622273123105615731316132703667",
"264903463837802912894567840950525975930",
"200885080256235266534023528527081164533",
"129699619617276911942727382026611734405",
"228207266622273123105615731316132703667",
"264903463837802912894567840950525975930"
],
"threshold": 0.9
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@c87f1f6ade56c711f8736901e330685b453e420e",
"target": {
"file": "net/sctp/sysctl.c"
},
"id": "CVE-2025-21639-6b01427a"
},
{
"signature_type": "Function",
"deprecated": false,
"digest": {
"length": 654.0,
"function_hash": "320644574685049514694324548353598690668"
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@c87f1f6ade56c711f8736901e330685b453e420e",
"target": {
"file": "net/sctp/sysctl.c",
"function": "proc_sctp_do_rto_max"
},
"id": "CVE-2025-21639-7d1df2e8"
},
{
"signature_type": "Function",
"deprecated": false,
"digest": {
"length": 648.0,
"function_hash": "219449015199003775866127252884513349503"
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@c8d179f3b1c1d60bf4484f50aa67b4c70f91bff9",
"target": {
"file": "net/sctp/sysctl.c",
"function": "proc_sctp_do_rto_min"
},
"id": "CVE-2025-21639-9b7bae5d"
},
{
"signature_type": "Line",
"deprecated": false,
"digest": {
"line_hashes": [
"180727810149142099799069873195762094948",
"61048545692312975392662374883849671710",
"228207266622273123105615731316132703667",
"264903463837802912894567840950525975930",
"180727810149142099799069873195762094948",
"61048545692312975392662374883849671710",
"228207266622273123105615731316132703667",
"264903463837802912894567840950525975930"
],
"threshold": 0.9
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@c8d179f3b1c1d60bf4484f50aa67b4c70f91bff9",
"target": {
"file": "net/sctp/sysctl.c"
},
"id": "CVE-2025-21639-d6392a3e"
},
{
"signature_type": "Function",
"deprecated": false,
"digest": {
"length": 648.0,
"function_hash": "219449015199003775866127252884513349503"
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@4059507e34aa5fe0fa9fd5b2b5f0c8b26ab2d482",
"target": {
"file": "net/sctp/sysctl.c",
"function": "proc_sctp_do_rto_min"
},
"id": "CVE-2025-21639-f1714acf"
},
{
"signature_type": "Line",
"deprecated": false,
"digest": {
"line_hashes": [
"198321148514104770370812398812262919908",
"129699619617276911942727382026611734405",
"228207266622273123105615731316132703667",
"264903463837802912894567840950525975930",
"53836062129814137040273743021815151529",
"129699619617276911942727382026611734405",
"228207266622273123105615731316132703667",
"264903463837802912894567840950525975930"
],
"threshold": 0.9
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@246428bfb9e7db15c5cd08e1d0eca41b65af2b06",
"target": {
"file": "net/sctp/sysctl.c"
},
"id": "CVE-2025-21639-f41fa65c"
},
{
"signature_type": "Function",
"deprecated": false,
"digest": {
"length": 654.0,
"function_hash": "66647506635892141314960249203232550563"
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@9fc17b76fc70763780aa78b38fcf4742384044a5",
"target": {
"file": "net/sctp/sysctl.c",
"function": "proc_sctp_do_rto_min"
},
"id": "CVE-2025-21639-f53939c0"
},
{
"signature_type": "Function",
"deprecated": false,
"digest": {
"length": 654.0,
"function_hash": "320644574685049514694324548353598690668"
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@9fc17b76fc70763780aa78b38fcf4742384044a5",
"target": {
"file": "net/sctp/sysctl.c",
"function": "proc_sctp_do_rto_max"
},
"id": "CVE-2025-21639-fa3ca758"
},
{
"signature_type": "Function",
"deprecated": false,
"digest": {
"length": 648.0,
"function_hash": "219449015199003775866127252884513349503"
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@246428bfb9e7db15c5cd08e1d0eca41b65af2b06",
"target": {
"file": "net/sctp/sysctl.c",
"function": "proc_sctp_do_rto_min"
},
"id": "CVE-2025-21639-fd9485b8"
}
]