Impact
The vulnerability is a null‑pointer dereference in the SCTP transmit path that occurs when the SCTP authentication key initialization fails. The flaw, classified as CWE‑476, allows the kernel to dereference a NULL shared‑key pointer while processing a DATA chunk with authentication enabled, leading to a kernel panic and system disruption.
Affected Systems
The issue affects Linux kernel builds that have not yet incorporated the command ordering change that moves SCTP_CMD_ASSOC_SHKEY immediately after SCTP_CMD_PEER_INIT. Known affected releases include the 6.6.0 and 6.19 RC1 through RC6 kernels, plus any unpatched generic Linux kernel that accepts SCTP traffic. Any machine running an unpatched kernel and able to receive SCTP packets is susceptible.
Risk and Exploitability
The CVSS score of 5.5 indicates moderate severity, while the EPSS score of less than 1% suggests a low likelihood of exploitation in the wild. The flaw is not listed in the CISA KEV catalog. The attack vector is inferred to be remote, network‑based via SCTP: an attacker can craft an INIT_ACK packet that triggers the key‑initialization failure, leading the kernel to crash. Because the fault occurs during SCTP packet handling, the adversary must be able to send SCTP traffic to the target. The risk is mitigated by applying the patch that reorders the command sequence to prevent the race condition that allowed the null dereference.
OpenCVE Enrichment
Ubuntu USN