CVE-2025-40331
BaseFortify
Publication date: 2025-12-09
Last updated on: 2025-12-09
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a Time-Of-Check to Time-Of-Use (TOCTOU) issue in the Linux kernel's SCTP (Stream Control Transmission Protocol) implementation. Specifically, it occurs when the address list grows between the time a buffer is allocated (time-of-check) and when data is written to it (time-of-use) in the sctp_diag_dump() -> sctp_for_each_endpoint() -> sctp_ep_dump() path without holding the socket lock. This can lead to an out-of-bounds write.
How can this vulnerability impact me? :
The vulnerability can lead to out-of-bounds memory writes, which may cause system instability, crashes, or potentially allow an attacker to execute arbitrary code or escalate privileges on the affected system.