{"id":"CVE-2025-40240","summary":"sctp: avoid NULL dereference when chunk data buffer is missing","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nsctp: avoid NULL dereference when chunk data buffer is missing\n\nchunk-\u003eskb pointer is dereferenced in the if-block where it's supposed\nto be NULL only.\n\nchunk-\u003eskb can only be NULL if chunk-\u003ehead_skb is not. Check for frag_list\ninstead and do it just before replacing chunk-\u003eskb. We're sure that\notherwise chunk-\u003eskb is non-NULL because of outer if() condition.","modified":"2026-05-18T05:59:32.170616407Z","published":"2025-12-04T15:31:29.715Z","related":["ALSA-2026:0443","ALSA-2026:0444","ALSA-2026:0445","ALSA-2026:0453","SUSE-SU-2026:0278-1","SUSE-SU-2026:0281-1","SUSE-SU-2026:0315-1","SUSE-SU-2026:0316-1","SUSE-SU-2026:20207-1","SUSE-SU-2026:20220-1","SUSE-SU-2026:20228-1","SUSE-SU-2026:20477-1","SUSE-SU-2026:20498-1","SUSE-SU-2026:20845-1","SUSE-SU-2026:20876-1","openSUSE-SU-2026:20145-1"],"database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/40xxx/CVE-2025-40240.json","cna_assigner":"Linux"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/03e80a4b04ef1fb2c61dd63216ab8d3a5dcb196f"},{"type":"WEB","url":"https://git.kernel.org/stable/c/08165c296597075763130919f2aae59b5822f016"},{"type":"WEB","url":"https://git.kernel.org/stable/c/441f0647f7673e0e64d4910ef61a5fb8f16bfb82"},{"type":"WEB","url":"https://git.kernel.org/stable/c/4f6da435fb5d8a21cbf8cae5ca5a2ba0e1012b71"},{"type":"WEB","url":"https://git.kernel.org/stable/c/61cda2777b07d27459f5cac5a047c3edf9c8a1a9"},{"type":"WEB","url":"https://git.kernel.org/stable/c/7a832b0f99be19df608cb75c023f8027b1789bd1"},{"type":"WEB","url":"https://git.kernel.org/stable/c/89b465b54227c245ddc7cc9ed822231af21123ef"},{"type":"WEB","url":"https://git.kernel.org/stable/c/cb9055ba30306ede4ad920002233d0659982f1cb"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/40xxx/CVE-2025-40240.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-40240"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"90017accff61ae89283ad9a51f9ac46ca01633fb"},{"fixed":"61cda2777b07d27459f5cac5a047c3edf9c8a1a9"},{"fixed":"08165c296597075763130919f2aae59b5822f016"},{"fixed":"03e80a4b04ef1fb2c61dd63216ab8d3a5dcb196f"},{"fixed":"4f6da435fb5d8a21cbf8cae5ca5a2ba0e1012b71"},{"fixed":"cb9055ba30306ede4ad920002233d0659982f1cb"},{"fixed":"7a832b0f99be19df608cb75c023f8027b1789bd1"},{"fixed":"89b465b54227c245ddc7cc9ed822231af21123ef"},{"fixed":"441f0647f7673e0e64d4910ef61a5fb8f16bfb82"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-40240.json"}},{"package":{"name":"Kernel","ecosystem":"Linux"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"4.8.0"},{"fixed":"5.4.301"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.5.0"},{"fixed":"5.10.246"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.11.0"},{"fixed":"5.15.196"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.16.0"},{"fixed":"6.1.158"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.2.0"},{"fixed":"6.6.115"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.7.0"},{"fixed":"6.12.56"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.13.0"},{"fixed":"6.17.6"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-40240.json"}}],"schema_version":"1.7.5"}