
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2025-21638 is a vulnerability in the Linux kernel's SCTP (Stream Control Transmission Protocol) subsystem, specifically in the sysctl authentication enable functionality. The vulnerability was discovered in January 2025 and affects the Linux kernel's network stack. The issue stems from improper usage of the 'current->nsproxy' structure in the SCTP sysctl authentication handling (Kernel Git).
The vulnerability arises from using the 'net' structure via 'current' in the SCTP sysctl authentication handling, which is not recommended for two main reasons: inconsistency in getting information from reader's/writer's netns versus opener's netns, and potential null pointer dereference when current->nsproxy is NULL during task exit. The issue was identified in the procsctpdo_auth function within the kernel's SCTP subsystem (Kernel Git).
The vulnerability can result in a kernel 'Oops' (null-ptr-deref) when the current task is exiting, particularly when using the acct(2) system call. This could lead to system instability and potential denial of service conditions (Kernel Git).
The vulnerability has been fixed in various kernel versions. The fix involves modifying the code to obtain the 'net' structure from the table->data using container_of() instead of accessing it through current->nsproxy. Debian has addressed this in version 6.1.128-1 for the bookworm release (Debian Security).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."