CVE-2025-40240
Description
In the Linux kernel, the following vulnerability has been resolved:
sctp: avoid NULL dereference when chunk data buffer is missing
chunk->skb pointer is dereferenced in the if-block where it's supposed to be NULL only.
chunk->skb can only be NULL if chunk->head_skb is not. Check for frag_list instead and do it just before replacing chunk->skb. We're sure that otherwise chunk->skb is non-NULL because of outer if() condition.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
A NULL pointer dereference in the Linux kernel's SCTP implementation can be triggered when chunk data buffer is missing, leading to a system crash.
Vulnerability
In the Linux kernel's SCTP implementation, a NULL pointer dereference occurs when chunk->skb is dereferenced in a code path where it is expected to be NULL. The root cause is that the check for a missing data buffer incorrectly uses chunk->skb instead of checking the frag_list. This flaw was introduced during a previous refactoring and can lead to a kernel crash when triggered [1].
Exploitation
An attacker can exploit this vulnerability by sending specially crafted SCTP packets that cause the chunk data buffer to be missing. No authentication is required if the attacker can send packets to the target system. The vulnerability is reachable from the network if SCTP is enabled on the victim machine [2].
Impact
Successful exploitation results in a kernel NULL pointer dereference, causing a system crash (denial of service). There is no indication of privilege escalation or remote code execution; the primary impact is availability [3].
Mitigation
The fix has been applied to the Linux kernel stable branches. Users should update to the latest patched kernel versions to remediate the vulnerability. No workaround is currently available [1][2][3].
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
2Patches
861cda2777b0708165c29659703e80a4b04ef4f6da435fb5dcb9055ba30307a832b0f99be89b465b54227441f0647f767Vulnerability mechanics
Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
8- git.kernel.org/stable/c/03e80a4b04ef1fb2c61dd63216ab8d3a5dcb196fnvd
- git.kernel.org/stable/c/08165c296597075763130919f2aae59b5822f016nvd
- git.kernel.org/stable/c/441f0647f7673e0e64d4910ef61a5fb8f16bfb82nvd
- git.kernel.org/stable/c/4f6da435fb5d8a21cbf8cae5ca5a2ba0e1012b71nvd
- git.kernel.org/stable/c/61cda2777b07d27459f5cac5a047c3edf9c8a1a9nvd
- git.kernel.org/stable/c/7a832b0f99be19df608cb75c023f8027b1789bd1nvd
- git.kernel.org/stable/c/89b465b54227c245ddc7cc9ed822231af21123efnvd
- git.kernel.org/stable/c/cb9055ba30306ede4ad920002233d0659982f1cbnvd
News mentions
0No linked articles in our index yet.