Updated: 2026-02-27 00:28:13.759257
Description:
In the Linux kernel, the following vulnerability has been resolved: sctp: sysctl: cookie_hmac_alg: avoid using current->nsproxy As mentioned in a previous commit of this series, using the 'net' structure via 'current' is not recommended for different reasons: - Inconsistency: getting info from the reader's/writer's netns vs only from the opener's netns. - current->nsproxy can be NULL in some cases, resulting in an 'Oops' (null-ptr-deref), e.g. when the current task is exiting, as spotted by syzbot [1] using acct(2). The 'net' structure can be obtained from the table->data using container_of(). Note that table->data could also be used directly, as this is the only member needed from the 'net' structure, but that would increase the size of this fix, to use '*data' everywhere 'net->sctp.sctp_hmac_alg' is used.
| Links | NIST | CIRCL | RHEL | Ubuntu |
| Severity | Score | |
|---|---|---|
| CVSS Version 2.x | 0.0 | |
| CVSS Version 3.x | MEDIUM | 5.5 |
| OS name | Project name | Version | Score | Severity | Status | Errata | Last updated | Statement |
|---|---|---|---|---|---|---|---|---|
| Ubuntu 16.04 ELS | linux-hwe | 4.15.0 | 5.5 | MEDIUM | Released | CLSA-2025:1757965001 | 2025-09-16 01:45:31 | Ignored due to low severity |
| Ubuntu 16.04 ELS | linux | 4.4.0 | 5.5 | MEDIUM | Released | CLSA-2025:1758009836 | 2025-09-16 12:27:57 | Ignored due to low severity |
| Ubuntu 18.04 ELS | linux | 4.15.0 | 5.5 | MEDIUM | Released | CLSA-2025:1758010922 | 2025-09-16 12:27:59 | |
| Ubuntu 20.04 ELS | linux | 5.4.0 | 5.5 | MEDIUM | Ignored | 2025-06-24 00:42:04 | Ignored due to low severity |