CVE-2025-22063

Severity CVSS v4.0:
Pending analysis
Type:
CWE-476 NULL Pointer Dereference
Publication date:
16/04/2025
Last modified:
03/11/2025

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> netlabel: Fix NULL pointer exception caused by CALIPSO on IPv4 sockets<br /> <br /> When calling netlbl_conn_setattr(), addr-&gt;sa_family is used<br /> to determine the function behavior. If sk is an IPv4 socket,<br /> but the connect function is called with an IPv6 address,<br /> the function calipso_sock_setattr() is triggered.<br /> Inside this function, the following code is executed:<br /> <br /> sk_fullsock(__sk) ? inet_sk(__sk)-&gt;pinet6 : NULL;<br /> <br /> Since sk is an IPv4 socket, pinet6 is NULL, leading to a<br /> null pointer dereference.<br /> <br /> This patch fixes the issue by checking if inet6_sk(sk)<br /> returns a NULL pointer before accessing pinet6.

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 4.8 (including) 5.4.292 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.5 (including) 5.10.236 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.11 (including) 5.15.180 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.16 (including) 6.1.134 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.2 (including) 6.6.87 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.7 (including) 6.12.23 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.13 (including) 6.13.11 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.14 (including) 6.14.2 (excluding)