#VU105665 NULL pointer dereference in Linux kernel - CVE-2025-21854


| Updated: 2025-05-11

Vulnerability identifier: #VU105665

Vulnerability risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21854

CWE-ID: CWE-476

Exploitation vector: Local

Exploit availability: No

Vulnerable software:
Linux kernel
Operating systems & Components / Operating system

Vendor: Linux Foundation

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the sock_map_sk_state_allowed() function in net/core/sock_map.c. A local user can perform a denial of service (DoS) attack.

Mitigation
Install update from vendor's website.

Vulnerable software versions

Linux kernel: 6.13, 6.13.1, 6.13.2, 6.13.3, 6.13.4


External links
https://git.kernel.org/stable/c/22b683217ad2112791a708693cb236507abd637a
https://git.kernel.org/stable/c/8fb5bb169d17cdd12c2dcc2e96830ed487d77a0f
https://git.kernel.org/stable/c/cc9a7832ede53ade1ba9991f0e27314caa4029d8
https://git.kernel.org/stable/c/f7b473e35986835cc2813fef7b9d40336a09247e
https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.13.5


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability