CVE-2025-40204
Description
In the Linux kernel, the following vulnerability has been resolved:
sctp: Fix MAC comparison to be constant-time
To prevent timing attacks, MACs need to be compared in constant time. Use the appropriate helper function for this.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
A constant-time MAC comparison was missing in the Linux kernel's SCTP implementation, potentially enabling timing attacks against authentication.
Vulnerability
Overview
CVE-2025-40204 is a security fix in the Linux kernel's Stream Control Transmission Protocol (SCTP) implementation. The vulnerability stems from the usage of a non-constant-time comparison when verifying Message Authentication Codes (MACs). By not using a constant-time comparison, an attacker could exploit timing differences to leak MAC values or forge messages.
Attack
Vector and Exploitation
To exploit this, an attacker would need the ability to observe the system's timing behavior during MAC verification, typically through a local or adjacent network position. The attack does not require authentication but relies on precise timing measurements. The SCTP protocol uses MACs for message integrity and authentication, and a non-constant-time comparison can leak information about the MAC through timing side channels.
Potential
Impact
An attacker could exploit the timing side channel to learn the secret MAC used in SCTP communications, potentially leading to message forgery or denial of service. Since MACs are used for protecting SCTP associations, this could compromise the integrity and authenticity of SCTP packets.
Mitigation
The fix introduces a constant-time MAC comparison function in the Linux kernel. The patch has been merged into stable kernel branches [1][2][3]. Users should apply the latest kernel updates to mitigate this vulnerability.
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
2Patches
8b93fa8dc521d0e8b8c326c2a1cd60e0d0fb89c05d44ec241ed3044b9c8108019b36992890b32ff285ff6dd91c79e4f58Vulnerability mechanics
Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
8- git.kernel.org/stable/c/0b32ff285ff6f6f1ac1d9495787ccce8837d6405nvd
- git.kernel.org/stable/c/0e8b8c326c2a6de4d837b1bb034ea704f4690d77nvd
- git.kernel.org/stable/c/1cd60e0d0fb8f0e62ec4499138afce6342dc9d4cnvd
- git.kernel.org/stable/c/8019b3699289fce3f10b63f98601db97b8d105b0nvd
- git.kernel.org/stable/c/9c05d44ec24126fc283835b68f82dba3ae985209nvd
- git.kernel.org/stable/c/b93fa8dc521d00d2d44bf034fb90e0d79b036617nvd
- git.kernel.org/stable/c/dd91c79e4f58fbe2898dac84858033700e0e99fbnvd
- git.kernel.org/stable/c/ed3044b9c810c5c24eb2830053fbfe5fd134c5d4nvd
News mentions
0No linked articles in our index yet.