| ID | CVE-2025-21635 | 
      
          | Sažetak | In the Linux kernel, the following vulnerability has been resolved:
rds: sysctl: rds_tcp_{rcv,snd}buf: avoid using current->nsproxy
As mentioned in a previous commit of this series, using the 'net'
structure via 'current' is not recommended for different reasons:
- Inconsistency: getting info from the reader's/writer's netns vs only
  from the opener's netns.
- current->nsproxy can be NULL in some cases, resulting in an 'Oops'
  (null-ptr-deref), e.g. when the current task is exiting, as spotted by
  syzbot [1] using acct(2).
The per-netns structure can be obtained from the table->data using
container_of(), then the 'net' one can be retrieved from the listen
socket (if available). | 
      
          | Reference |  | 
      
        | CVSS | 
              | Base: | 5.5 |  | Impact: | 3.6 |  | Exploitability: | 1.8 |  | 
    
        | Pristup | 
            | Vektor | Složenost | Autentikacija |  
            | LOCAL | LOW | LOW |  | 
      
        | Impact | 
            | Povjerljivost | Cjelovitost | Dostupnost |  
            | NONE | NONE | HIGH |  | 
    
        | CVSS vektor | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H | 
      
          | Zadnje važnije ažuriranje | 01-10-2025 - 20:18 | 
      
          | Objavljeno | 19-01-2025 - 11:15 |