In the Linux kernel, the following vulnerability has been resolved:
sctp: add mutual exclusion in procsctpdoudpport()
We must serialize calls to sctpudpsockstop() and sctpudpsockstart() or risk a crash as syzbot reported:
Oops: general protection fault, probably for non-canonical address 0xdffffc000000000d: 0000 [#1] SMP KASAN PTI KASAN: null-ptr-deref in range [0x0000000000000068-0x000000000000006f] CPU: 1 UID: 0 PID: 6551 Comm: syz.1.44 Not tainted 6.14.0-syzkaller-g7f2ff7b62617 #0 PREEMPT(full) Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 RIP: 0010:kernelsockshutdown+0x47/0x70 net/socket.c:3653 Call Trace: <TASK> udptunnelsockrelease+0x68/0x80 net/ipv4/udptunnelcore.c:181 sctpudpsockstop+0x71/0x160 net/sctp/protocol.c:930 procsctpdoudpport+0x264/0x450 net/sctp/sysctl.c:553 procsyscallhandler+0x3d0/0x5b0 fs/proc/procsysctl.c:601 iterfilesplicewrite+0x91c/0x1150 fs/splice.c:738 dosplicefrom fs/splice.c:935 [inline] directspliceactor+0x18f/0x6c0 fs/splice.c:1158 splicedirecttoactor+0x342/0xa30 fs/splice.c:1102 dosplicedirectactor fs/splice.c:1201 [inline] dosplicedirect+0x174/0x240 fs/splice.c:1227 dosendfile+0xafd/0xe50 fs/readwrite.c:1368 _dosyssendfile64 fs/readwrite.c:1429 [inline] _sesyssendfile64 fs/readwrite.c:1415 [inline] _x64syssendfile64+0x1d8/0x220 fs/readwrite.c:1415 dosyscallx64 arch/x86/entry/syscall64.c:63 [inline]
[
{
"signature_type": "Function",
"deprecated": false,
"signature_version": "v1",
"target": {
"file": "net/sctp/sysctl.c",
"function": "proc_sctp_do_udp_port"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@b3598f53211ba1025485306de2733bdd241311a3",
"digest": {
"length": 933.0,
"function_hash": "72194422377214018403273080148954178301"
},
"id": "CVE-2025-22062-0449a5b0"
},
{
"signature_type": "Function",
"deprecated": false,
"signature_version": "v1",
"target": {
"file": "net/sctp/sysctl.c",
"function": "proc_sctp_do_udp_port"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@386507cb6fb7cdef598ddcb3f0fa37e6ca9e789d",
"digest": {
"length": 933.0,
"function_hash": "72194422377214018403273080148954178301"
},
"id": "CVE-2025-22062-08c0269a"
},
{
"signature_type": "Function",
"deprecated": false,
"signature_version": "v1",
"target": {
"file": "net/sctp/sysctl.c",
"function": "proc_sctp_do_udp_port"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@10206302af856791fbcc27a33ed3c3eb09b2793d",
"digest": {
"length": 939.0,
"function_hash": "158446033508741387094151249661676565200"
},
"id": "CVE-2025-22062-2749596f"
},
{
"signature_type": "Line",
"deprecated": false,
"signature_version": "v1",
"target": {
"file": "net/sctp/sysctl.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@386507cb6fb7cdef598ddcb3f0fa37e6ca9e789d",
"digest": {
"line_hashes": [
"91195616580136624045447301995345474953",
"149606065025969864843240519620736472547",
"219087382491806837073607763651327094214",
"23372714893802884834430862839776635996",
"244823626086235909782129921057214903799",
"37966932095649448002290122085310555675",
"274813536511091907333686606523226059606",
"30739100923761642728077807799128698234",
"41309831791893774864782949106403849300",
"151523426068919496792734711024928523223"
],
"threshold": 0.9
},
"id": "CVE-2025-22062-2da06656"
},
{
"signature_type": "Line",
"deprecated": false,
"signature_version": "v1",
"target": {
"file": "net/sctp/sysctl.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@10206302af856791fbcc27a33ed3c3eb09b2793d",
"digest": {
"line_hashes": [
"123872893151409057444014697781658251724",
"42278863548273566032228048707063981046",
"197110365587071207957341927680465210218",
"23372714893802884834430862839776635996",
"244823626086235909782129921057214903799",
"37966932095649448002290122085310555675",
"274813536511091907333686606523226059606",
"30739100923761642728077807799128698234",
"41309831791893774864782949106403849300",
"151523426068919496792734711024928523223"
],
"threshold": 0.9
},
"id": "CVE-2025-22062-6857f3c5"
},
{
"signature_type": "Line",
"deprecated": false,
"signature_version": "v1",
"target": {
"file": "net/sctp/sysctl.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@d3d7675d77622f6ca1aae14c51f80027b36283f8",
"digest": {
"line_hashes": [
"123872893151409057444014697781658251724",
"42278863548273566032228048707063981046",
"197110365587071207957341927680465210218",
"23372714893802884834430862839776635996",
"244823626086235909782129921057214903799",
"37966932095649448002290122085310555675",
"274813536511091907333686606523226059606",
"30739100923761642728077807799128698234",
"41309831791893774864782949106403849300",
"151523426068919496792734711024928523223"
],
"threshold": 0.9
},
"id": "CVE-2025-22062-68d9c35a"
},
{
"signature_type": "Line",
"deprecated": false,
"signature_version": "v1",
"target": {
"file": "net/sctp/sysctl.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@b3598f53211ba1025485306de2733bdd241311a3",
"digest": {
"line_hashes": [
"91195616580136624045447301995345474953",
"149606065025969864843240519620736472547",
"219087382491806837073607763651327094214",
"23372714893802884834430862839776635996",
"244823626086235909782129921057214903799",
"37966932095649448002290122085310555675",
"274813536511091907333686606523226059606",
"30739100923761642728077807799128698234",
"41309831791893774864782949106403849300",
"151523426068919496792734711024928523223"
],
"threshold": 0.9
},
"id": "CVE-2025-22062-74bdb6a8"
},
{
"signature_type": "Function",
"deprecated": false,
"signature_version": "v1",
"target": {
"file": "net/sctp/sysctl.c",
"function": "proc_sctp_do_udp_port"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@d3d7675d77622f6ca1aae14c51f80027b36283f8",
"digest": {
"length": 939.0,
"function_hash": "158446033508741387094151249661676565200"
},
"id": "CVE-2025-22062-ab2351a6"
}
]