CVE-2025-40187
Description
In the Linux kernel, the following vulnerability has been resolved:
net/sctp: fix a null dereference in sctp_disposition sctp_sf_do_5_1D_ce()
If new_asoc->peer.adaptation_ind=0 and sctp_ulpevent_make_authkey=0 and sctp_ulpevent_make_authkey() returns 0, then the variable ai_ev remains zero and the zero will be dereferenced in the sctp_ulpevent_free() function.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
A null pointer dereference in the Linux kernel's SCTP implementation can occur when handling a COOKIE ECHO chunk, leading to a crash.
Vulnerability
In the Linux kernel's SCTP implementation, a null pointer dereference vulnerability exists in the sctp_sf_do_5_1D_ce() function, which handles incoming COOKIE ECHO chunks during association setup. The bug occurs when new_asoc->peer.adaptation_ind is zero and sctp_ulpevent_make_authkey() returns zero, causing the variable ai_ev to remain zero. This zero value is then passed to sctp_ulpevent_free(), which dereferences it, leading to a kernel crash [1][2][3].
Exploitation
An attacker can trigger this vulnerability by sending a specially crafted COOKIE ECHO chunk to a vulnerable system. No authentication is required, as the SCTP association setup process is initiated before authentication is fully established. The attack can be performed remotely over the network, targeting systems that have the SCTP protocol enabled.
Impact
Successful exploitation results in a denial of service (DoS) condition due to a kernel panic or crash. The vulnerability does not appear to allow arbitrary code execution or privilege escalation, as the dereference of a null pointer typically leads to an immediate system crash.
Mitigation
Mitigation
The vulnerability has been patched in the Linux kernel. Users should apply the latest stable kernel updates to remediate the issue. The fix ensures that ai_ev is properly checked before being passed to sctp_ulpevent_free() [1][2][3].
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
2Patches
81014b83778c87f702f85df02dbceedc0213e025419f4e216c21f45cfa4a9d0e8f1445c19badbd79313e62f3119686ef5Vulnerability mechanics
Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
8- git.kernel.org/stable/c/025419f4e216a3ae0d0cec622262e98e8078c447nvd
- git.kernel.org/stable/c/1014b83778c8677f1d7a57c26dc728baa801ac62nvd
- git.kernel.org/stable/c/2f3119686ef50319490ccaec81a575973da98815nvd
- git.kernel.org/stable/c/7f702f85df0266ed7b5bab81ba50394c92f3c928nvd
- git.kernel.org/stable/c/badbd79313e6591616c1b78e29a9b71efed7f035nvd
- git.kernel.org/stable/c/c21f45cfa4a9526b34d76b397c9ef080668b6e73nvd
- git.kernel.org/stable/c/d0e8f1445c19b1786759ba72a38267e1449bab7envd
- git.kernel.org/stable/c/dbceedc0213e75bf3e9f9f9e2f66b10699d004fenvd
News mentions
0No linked articles in our index yet.