CVE-2025-22062
📋 TL;DR
A race condition vulnerability in the Linux kernel's SCTP protocol implementation allows concurrent calls to UDP socket start/stop functions, potentially causing a NULL pointer dereference and kernel crash. This affects Linux systems with SCTP enabled and could lead to denial of service. The vulnerability requires local access to trigger via procfs.
💻 Affected Systems
- Linux kernel
📦 What is this software?
Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →⚠️ Risk & Real-World Impact
Worst Case
Kernel panic leading to system crash and denial of service, requiring physical or remote console access to reboot.
Likely Case
Local denial of service through kernel crash when malicious user triggers the race condition via procfs.
If Mitigated
Minimal impact if SCTP is disabled or proper access controls prevent local users from accessing procfs.
🎯 Exploit Status
Syzbot reported the crash with a reproducer. Exploitation requires local access to trigger the race condition via /proc/sys/net/sctp/udp_port.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Fixed in kernel stable releases via commits: 10206302af856791fbcc27a33ed3c3eb09b2793d, 386507cb6fb7cdef598ddcb3f0fa37e6ca9e789d, 65ccb2793da7401772a3ffe85355c831b313c59f, b3598f53211ba1025485306de2733bdd241311a3, d3d7675d77622f6ca1aae14c51f80027b36283f8
Vendor Advisory: https://git.kernel.org/stable/c/10206302af856791fbcc27a33ed3c3eb09b2793d
Restart Required: Yes
Instructions:
1. Update Linux kernel to patched version from your distribution vendor. 2. Reboot system to load new kernel. 3. Verify kernel version after reboot.
🔧 Temporary Workarounds
Disable SCTP protocol
linuxRemove SCTP kernel module to prevent exploitation
sudo modprobe -r sctp
echo 'blacklist sctp' | sudo tee /etc/modprobe.d/blacklist-sctp.conf
Restrict procfs access
linuxLimit access to /proc/sys/net/sctp/ to prevent local users from triggering the vulnerability
sudo chmod 600 /proc/sys/net/sctp/udp_port
sudo chown root:root /proc/sys/net/sctp/udp_port
🧯 If You Can't Patch
- Disable SCTP protocol support in kernel configuration and reboot
- Implement strict access controls to prevent local users from accessing /proc/sys/net/sctp/
🔍 How to Verify
Check if Vulnerable:
Check if SCTP is enabled: lsmod | grep sctp or check /proc/net/protocols for SCTP
Check Version:
uname -r
Verify Fix Applied:
Check kernel version against patched releases and verify SCTP module loads without issues
📡 Detection & Monitoring
Log Indicators:
- Kernel panic messages in /var/log/kern.log or dmesg
- NULL pointer dereference errors mentioning sctp_udp_sock_stop or proc_sctp_do_udp_port
Network Indicators:
- Unusual SCTP protocol activity from local processes
SIEM Query:
source="kernel" AND ("general protection fault" OR "null-ptr-deref" OR "sctp_udp_sock")
🔗 References
- https://git.kernel.org/stable/c/10206302af856791fbcc27a33ed3c3eb09b2793d
- https://git.kernel.org/stable/c/386507cb6fb7cdef598ddcb3f0fa37e6ca9e789d
- https://git.kernel.org/stable/c/65ccb2793da7401772a3ffe85355c831b313c59f
- https://git.kernel.org/stable/c/b3598f53211ba1025485306de2733bdd241311a3
- https://git.kernel.org/stable/c/d3d7675d77622f6ca1aae14c51f80027b36283f8
- https://git.kernel.org/stable/c/e5178bfc55b3a78000f0f8298e7ade88783ce581
- https://git.kernel.org/stable/c/efb8cb487be8f4ba6aaef616011d702d6a083ed1
- https://lists.debian.org/debian-lts-announce/2025/08/msg00010.html