NULL pointer dereference in Linux kernel atm



| Updated: 2025-05-10
Risk Low
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2025-22018
CWE-ID CWE-476
Exploitation vector Local
Public exploit N/A
Vulnerable software
Linux kernel
Operating systems & Components / Operating system

Vendor Linux Foundation

Security Bulletin

This security bulletin contains one low risk vulnerability.

1) NULL pointer dereference

EUVDB-ID: #VU107728

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-22018

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the MPOA_cache_impos_rcvd() function in net/atm/mpc.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Linux kernel: 5.15 - 5.15.179

CPE2.3 External links

https://git.kernel.org/stable/c/09691f367df44fe93255274d80a439f9bb3263fc
https://git.kernel.org/stable/c/0ef6e49881b6b50ac454cb9d6501d009fdceb6fc
https://git.kernel.org/stable/c/14c7aca5ba2740973de27c1bb8df77b4dcb6f775
https://git.kernel.org/stable/c/1505f9b720656b17865e4166ab002960162bf679
https://git.kernel.org/stable/c/3c23bb2c894e9ef2727682f98c341b20f78c9013
https://git.kernel.org/stable/c/9da6b6340dbcf0f60ae3ec6a7d6438337c32518a
https://git.kernel.org/stable/c/ab92f51c7f53a08f1a686bfb80690ebb3672357d
https://git.kernel.org/stable/c/bf2986fcf82a449441f9ee4335df19be19e83970
https://git.kernel.org/stable/c/d7f1e4a53a51cc6ba833afcb40439f18dab61c1f
https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.180


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###