VYPR
Unrated severityNVD Advisory· Published Nov 12, 2025· Updated Apr 15, 2026

CVE-2025-40187

CVE-2025-40187

Description

In the Linux kernel, the following vulnerability has been resolved:

net/sctp: fix a null dereference in sctp_disposition sctp_sf_do_5_1D_ce()

If new_asoc->peer.adaptation_ind=0 and sctp_ulpevent_make_authkey=0 and sctp_ulpevent_make_authkey() returns 0, then the variable ai_ev remains zero and the zero will be dereferenced in the sctp_ulpevent_free() function.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A null pointer dereference in the Linux kernel's SCTP implementation can occur when handling a COOKIE ECHO chunk, leading to a crash.

Vulnerability

In the Linux kernel's SCTP implementation, a null pointer dereference vulnerability exists in the sctp_sf_do_5_1D_ce() function, which handles incoming COOKIE ECHO chunks during association setup. The bug occurs when new_asoc->peer.adaptation_ind is zero and sctp_ulpevent_make_authkey() returns zero, causing the variable ai_ev to remain zero. This zero value is then passed to sctp_ulpevent_free(), which dereferences it, leading to a kernel crash [1][2][3].

Exploitation

An attacker can trigger this vulnerability by sending a specially crafted COOKIE ECHO chunk to a vulnerable system. No authentication is required, as the SCTP association setup process is initiated before authentication is fully established. The attack can be performed remotely over the network, targeting systems that have the SCTP protocol enabled.

Impact

Successful exploitation results in a denial of service (DoS) condition due to a kernel panic or crash. The vulnerability does not appear to allow arbitrary code execution or privilege escalation, as the dereference of a null pointer typically leads to an immediate system crash.

Mitigation

Mitigation

The vulnerability has been patched in the Linux kernel. Users should apply the latest stable kernel updates to remediate the issue. The fix ensures that ai_ev is properly checked before being passed to sctp_ulpevent_free() [1][2][3].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2
  • Linux/Kernelinferred2 versions
    (expand)+ 1 more
    • (no CPE)
    • (no CPE)range: all versions containing the vulnerable SCTP code before the fix

Patches

8

Vulnerability mechanics

Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

8

News mentions

0

No linked articles in our index yet.