CVE-2026-23125
Null Pointer Dereference in Linux Kernel SCTP Transmit Path
Publication date: 2026-02-14
Last updated on: 2026-03-18
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | From 5.11 (inc) to 5.15.199 (exc) |
| linux | linux_kernel | From 5.16 (inc) to 6.1.162 (exc) |
| linux | linux_kernel | From 6.2 (inc) to 6.6.122 (exc) |
| linux | linux_kernel | From 6.7 (inc) to 6.12.68 (exc) |
| linux | linux_kernel | From 6.13 (inc) to 6.18.8 (exc) |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | From 2.6.24 (inc) to 5.10.249 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-476 | The product dereferences a pointer that it expects to be valid but is NULL. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in the Linux kernel's SCTP (Stream Control Transmission Protocol) transmit path. It is caused by a null pointer dereference that occurs when the SCTP-AUTH key initialization fails during the processing of an INIT_ACK message.
Specifically, if the command SCTP_CMD_ASSOC_SHKEY fails, the shared key (shkey) remains NULL, but the peer's authentication capability and peer chunks are already set. This allows an authenticated DATA chunk with auth = 1 but a NULL shared key to be queued and transmitted.
Because the command sequence stops on failure, no COOKIE_ECHO should be sent, but the timer T1_COOKIE may still enqueue a COOKIE_ECHO later. This causes the DATA chunk to be transmitted together with the COOKIE_ECHO, leading to a null pointer dereference and potential kernel crash.
The fix moves the SCTP_CMD_ASSOC_SHKEY command earlier in the sequence to ensure that if shared key generation fails, authenticated DATA cannot be sent, preventing the issue.
How can this vulnerability impact me? :
This vulnerability can cause a null pointer dereference in the Linux kernel, which may lead to a kernel crash or system instability.
If exploited, it could disrupt network communications using SCTP by causing denial of service conditions on affected systems.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
How can this vulnerability be detected on my network or system? Can you suggest some commands?
I don't know
What immediate steps should I take to mitigate this vulnerability?
The vulnerability has been resolved by moving the SCTP_CMD_ASSOC_SHKEY command immediately after SCTP_CMD_PEER_INIT in the Linux kernel SCTP implementation. This change ensures that if shared key generation fails, authenticated DATA cannot be sent, preventing the null pointer dereference.
Therefore, the immediate mitigation step is to update your Linux kernel to a version that includes this fix (version 6.6.0 or later with the patch applied).