SB20250422104 - NULL pointer dereference in Linux kernel sctp
Published: April 22, 2025 Updated: May 10, 2025
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) NULL pointer dereference (CVE-ID: CVE-2025-22062)
The vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the proc_sctp_do_auth() and proc_sctp_do_udp_port() functions in net/sctp/sysctl.c. A local user can perform a denial of service (DoS) attack.
Remediation
Install update from vendor's website.
References
- https://git.kernel.org/stable/c/10206302af856791fbcc27a33ed3c3eb09b2793d
- https://git.kernel.org/stable/c/d3d7675d77622f6ca1aae14c51f80027b36283f8
- https://git.kernel.org/stable/c/e5178bfc55b3a78000f0f8298e7ade88783ce581
- https://git.kernel.org/stable/c/efb8cb487be8f4ba6aaef616011d702d6a083ed1
- https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.13.11