CVE-2026-23125

Severity
5.5MEDIUM
EPSS
0.0%
top 97.17%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedFeb 14
Latest updateApr 9

Description

In the Linux kernel, the following vulnerability has been resolved: sctp: move SCTP_CMD_ASSOC_SHKEY right after SCTP_CMD_PEER_INIT A null-ptr-deref was reported in the SCTP transmit path when SCTP-AUTH key initialization fails: KASAN: null-ptr-deref in range [0x0000000000000018-0x000000000000001f] CPU: 0 PID: 16 Comm: ksoftirqd/0 Tainted: G W 6.6.0 #2 RIP: 0010:sctp_packet_bundle_auth net/sctp/output.c:264 [inline] RIP: 0010:sctp_packet_append_chunk+0xb36/0x1260 net/sctp/output.c:401 Call Tra

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:HExploitability: 1.8 | Impact: 3.6

Affected Packages3 packages

NVDlinux/linux_kernel2.6.245.10.249+6
CVEListV5linux/linux730fc3d05cd4ba4c9ce2de91f3d43349e95dbbf55a309bedf02ee08b0653215f06c94d61ec7a214a+7
Debianlinux< 5.10.249-1+3

Patches

🔴Vulnerability Details

3
OSV
CVE-2026-23125: In the Linux kernel, the following vulnerability has been resolved: sctp: move SCTP_CMD_ASSOC_SHKEY right after SCTP_CMD_PEER_INIT A null-ptr-deref wa2026-02-14
CVEList
sctp: move SCTP_CMD_ASSOC_SHKEY right after SCTP_CMD_PEER_INIT2026-02-14
GHSA
GHSA-crj3-7xqp-x3m2: In the Linux kernel, the following vulnerability has been resolved: sctp: move SCTP_CMD_ASSOC_SHKEY right after SCTP_CMD_PEER_INIT A null-ptr-deref2026-02-14

📋Vendor Advisories

3
Ubuntu
Linux kernel (NVIDIA Tegra) vulnerabilities2026-04-09
Red Hat
kernel: sctp: move SCTP_CMD_ASSOC_SHKEY right after SCTP_CMD_PEER_INIT2026-02-14
Debian
CVE-2026-23125: linux - In the Linux kernel, the following vulnerability has been resolved: sctp: move ...2026

🕵️Threat Intelligence

1
Wiz
CVE-2026-23125 Impact, Exploitability, and Mitigation Steps | Wiz
CVE-2026-23125 (MEDIUM CVSS 5.5) | In the Linux kernel | cvebase.io