CVE-2025-21640
📋 TL;DR
This CVE describes a NULL pointer dereference vulnerability in the Linux kernel's SCTP subsystem. When the kernel accesses current->nsproxy (which can be NULL during process exit), it can cause a kernel panic or system crash. This affects all Linux systems with SCTP enabled.
💻 Affected Systems
- Linux kernel
📦 What is this software?
Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →⚠️ Risk & Real-World Impact
Worst Case
Kernel panic leading to system crash and denial of service, potentially causing system instability or downtime.
Likely Case
System crash or kernel panic when specific conditions trigger the NULL pointer dereference, resulting in denial of service.
If Mitigated
Minimal impact if SCTP is disabled or systems are properly patched.
🎯 Exploit Status
Exploitation requires triggering the specific code path during process exit. Discovered by syzbot fuzzer using acct(2) system call.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Multiple stable kernel commits available (see references in CVE description)
Vendor Advisory: https://git.kernel.org/stable/c/03ca51faba2b017bf6c90e139434c4117d0afcdc
Restart Required: Yes
Instructions:
1. Update Linux kernel to patched version from your distribution vendor. 2. Reboot system to load new kernel. 3. Verify kernel version after reboot.
🔧 Temporary Workarounds
Disable SCTP kernel module
linuxPrevent loading of SCTP kernel module to avoid vulnerability
echo 'install sctp /bin/true' >> /etc/modprobe.d/disable-sctp.conf
rmmod sctp 2>/dev/null || true
Block SCTP at firewall
linuxPrevent SCTP network traffic from reaching vulnerable systems
iptables -A INPUT -p sctp -j DROP
iptables -A OUTPUT -p sctp -j DROP
🧯 If You Can't Patch
- Disable SCTP functionality in kernel configuration if possible
- Implement strict network segmentation to limit SCTP traffic exposure
🔍 How to Verify
Check if Vulnerable:
Check if SCTP module is loaded: lsmod | grep sctp. If loaded and kernel is unpatched, system is vulnerable.
Check Version:
uname -r
Verify Fix Applied:
Check kernel version against patched versions from your distribution vendor. Verify SCTP functionality still works if needed.
📡 Detection & Monitoring
Log Indicators:
- Kernel panic messages in /var/log/messages or dmesg
- System crash/reboot events
- NULL pointer dereference errors in kernel logs
Network Indicators:
- SCTP protocol traffic to/from affected systems
- Unexpected SCTP connection attempts
SIEM Query:
source="kernel" AND ("NULL pointer dereference" OR "kernel panic" OR "Oops") AND "sctp"
🔗 References
- https://git.kernel.org/stable/c/03ca51faba2b017bf6c90e139434c4117d0afcdc
- https://git.kernel.org/stable/c/3cd0659deb9c03535fd61839e91d4d4d3e51ac71
- https://git.kernel.org/stable/c/5599b212d2f4466e1832a94e9932684aaa364587
- https://git.kernel.org/stable/c/86ddf8118123cb58a0fb8724cad6979c4069065b
- https://git.kernel.org/stable/c/ad673e514b2793b8d5902f6ba6ab7e890dea23d5
- https://git.kernel.org/stable/c/ea62dd1383913b5999f3d16ae99d411f41b528d4
- https://git.kernel.org/stable/c/f0bb3935470684306e4e04793a20ac4c4b08de0b
- https://lists.debian.org/debian-lts-announce/2025/03/msg00001.html
- https://lists.debian.org/debian-lts-announce/2025/03/msg00002.html