In the Linux kernel, the following vulnerability has been resolved: sctp: avoid NULL dereference when chunk data buffer is missing chunk->skb pointer is dereferenced in the if-block where it's supposed to be NULL only. chunk->skb can only be NULL if chunk->head_skb is not. Check for frag_list instead and do it just before replacing chunk->skb. We're sure that otherwise chunk->skb is non-NULL because of outer if() condition.
Upstream advisory: https://lore.kernel.org/linux-cve-announce/2025120403-CVE-2025-40240-745a@gregkh/T
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2026:0443 https://access.redhat.com/errata/RHSA-2026:0443
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2026:0444 https://access.redhat.com/errata/RHSA-2026:0444
This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2026:0445 https://access.redhat.com/errata/RHSA-2026:0445
This issue has been addressed in the following products: Red Hat Enterprise Linux 10 Via RHSA-2026:0453 https://access.redhat.com/errata/RHSA-2026:0453