#VU107716 NULL pointer dereference in Linux kernel - CVE-2025-22063
Published: April 22, 2025 / Updated: May 10, 2025
Vulnerability identifier: #VU107716
Vulnerability risk: Low
CVSSv4.0: CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2025-22063
CWE-ID: CWE-476
Exploitation vector: Local access
Exploit availability:
No public exploit available
Vulnerable software:
Linux kernel
Linux kernel
Software vendor:
Linux Foundation
Linux Foundation
Description
The vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the calipso_sock_getattr() and calipso_sock_setattr() functions in net/ipv6/calipso.c. A local user can perform a denial of service (DoS) attack.
Remediation
Install update from vendor's website.
External links
- https://git.kernel.org/stable/c/078aabd567de3d63d37d7673f714e309d369e6e2
- https://git.kernel.org/stable/c/172a8a996a337206970467e871dd995ac07640b1
- https://git.kernel.org/stable/c/1927d0bcd5b81e80971bf6b8eba267508bd1c78b
- https://git.kernel.org/stable/c/1ad9166cab6a0f5c0b10344a97bdf749ae11dcbf
- https://git.kernel.org/stable/c/1e38f7a6cdd68377f8a4189b2fbaec14a6dd5152
- https://git.kernel.org/stable/c/3ba9cf69de50e8abed32b448616c313baa4c5712
- https://git.kernel.org/stable/c/797e5371cf55463b4530bab3fef5f27f7c6657a8
- https://git.kernel.org/stable/c/9fe3839588db7519030377b7dee3f165e654f6c5
- https://git.kernel.org/stable/c/a7e89541d05b98c79a51c0f95df020f8e82b62ed
- https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.180