CWE
476
Advisory Published
Updated

CVE-2025-22063: netlabel: Fix NULL pointer exception caused by CALIPSO on IPv4 sockets

First published: Wed Apr 16 2025(Updated: )

In the Linux kernel, the following vulnerability has been resolved: netlabel: Fix NULL pointer exception caused by CALIPSO on IPv4 sockets When calling netlbl_conn_setattr(), addr->sa_family is used to determine the function behavior. If sk is an IPv4 socket, but the connect function is called with an IPv6 address, the function calipso_sock_setattr() is triggered. Inside this function, the following code is executed: sk_fullsock(__sk) ? inet_sk(__sk)->pinet6 : NULL; Since sk is an IPv4 socket, pinet6 is NULL, leading to a null pointer dereference. This patch fixes the issue by checking if inet6_sk(sk) returns a NULL pointer before accessing pinet6.

Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

Affected SoftwareAffected VersionHow to fix
Linux Kernel
Linux Kernel>=4.8<5.4.292
Linux Kernel>=5.5<5.10.236
Linux Kernel>=5.11<5.15.180
Linux Kernel>=5.16<6.1.134
Linux Kernel>=6.2<6.6.87
Linux Kernel>=6.7<6.12.23
Linux Kernel>=6.13<6.13.11
Linux Kernel>=6.14<6.14.2

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the severity of CVE-2025-22063?

    CVE-2025-22063 is considered a medium severity vulnerability due to the potential for a NULL pointer dereference.

  • How do I fix CVE-2025-22063?

    To fix CVE-2025-22063, it is recommended to update the Linux kernel to a version that includes the patch addressing this vulnerability.

  • What systems are affected by CVE-2025-22063?

    CVE-2025-22063 affects Linux kernel versions that utilize IPv4 sockets and the netlbl_conn_setattr() function.

  • What type of vulnerability is CVE-2025-22063?

    CVE-2025-22063 is a NULL pointer dereference vulnerability in the Linux kernel networking subsystem.

  • Is there a known exploit for CVE-2025-22063?

    As of now, there is no publicly known exploit for CVE-2025-22063, but it should be addressed promptly to prevent potential exploitation.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203