sctp

  1. CVE-2024-0639 Linux SCTP Deadlock Fix in the Kernel

    The Linux kernel received a low‑to‑medium severity vulnerability report identified as CVE-2024-0639, a subtle locking bug in the SCTP subsystem that can trigger a kernel deadlock on the per‑net workqueue lock net->sctp.addr_wq_lock, allowing a local attacker to cause a denial‑of‑service (DoS) by...
  2. CVE-2024-3567: QEMU SCTP Checksum Crash Enables Guest‑Triggered Host DoS

    A reachable assertion in QEMU’s SCTP checksum routine can be triggered from a guest and drop the host-side QEMU process, producing a reliability- and availability-impacting denial-of-service that operators should treat as urgent: CVE-2024-3567 is a net-layer assertion failure in...
  3. Linux Kernel CVE-2025-40331 TOCTOU Fix in SCTP Diagnostic Path

    A recently disclosed Linux kernel vulnerability, tracked as CVE-2025-40331, closes a small but significant TOCTOU (time‑of‑check/time‑of‑use) window in the kernel’s SCTP diagnostic path to prevent an out‑of‑bounds write that can crash or destabilize affected systems. The fix is localized to...
  4. CVE-2025-40281: Linux SCTP Shift-Out-Of-Bounds Fix for Kernel Robustness

    A newly assigned Linux-kernel vulnerability, CVE-2025-40281, fixes a potential shift-out-of-bounds in the SCTP transport code — a rare but real correctness bug discovered by syzbot that could cause kernel instability when unexpectedly large sysctl parameters are processed by...
  5. Linux SCTP MAC Timing Fix for CVE-2025-40204

    The Linux kernel update that closed CVE-2025-40204 was a surgical but important hardening: the SCTP code was performing a MAC (message authentication code) comparison using a timing‑dependent routine, and maintainers replaced that comparison with a constant‑time helper to remove a potential...
  6. Linux SCTP Patch Fixes NULL Pointer Dereference CVE-2025-40187

    The Linux kernel received a targeted, low‑risk patch that closes a null‑pointer dereference in the SCTP receive/state‑machine code — tracked as CVE‑2025‑40187 — a defect that could trigger kernel oopses or host reboots when specially sequenced AUTH/INIT state transitions leave an internal event...
  7. Linux Kernel SCTP Patch Fixes NULL Pointer Dereference CVE-2025-40240

    The Linux kernel has been updated to fix CVE-2025-40240, a small but important defensive bug in the SCTP receive path that could trigger a kernel NULL-pointer dereference when a chunk’s data buffer is missing; the upstream patch reorders checks and uses the chunk header instead of dereferencing...