๐Ÿ” CVE Alert

CVE-2025-22063

MEDIUM 5.5

netlabel: Fix NULL pointer exception caused by CALIPSO on IPv4 sockets

CVSS Score
5.5
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: netlabel: Fix NULL pointer exception caused by CALIPSO on IPv4 sockets When calling netlbl_conn_setattr(), addr->sa_family is used to determine the function behavior. If sk is an IPv4 socket, but the connect function is called with an IPv6 address, the function calipso_sock_setattr() is triggered. Inside this function, the following code is executed: sk_fullsock(__sk) ? inet_sk(__sk)->pinet6 : NULL; Since sk is an IPv4 socket, pinet6 is NULL, leading to a null pointer dereference. This patch fixes the issue by checking if inet6_sk(sk) returns a NULL pointer before accessing pinet6.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Apr 16, 2025
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new medium vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
ceba1832b1b2da0149c51de62a847c00bca1677a < 1ad9166cab6a0f5c0b10344a97bdf749ae11dcbf ceba1832b1b2da0149c51de62a847c00bca1677a < 1e38f7a6cdd68377f8a4189b2fbaec14a6dd5152 ceba1832b1b2da0149c51de62a847c00bca1677a < a7e89541d05b98c79a51c0f95df020f8e82b62ed ceba1832b1b2da0149c51de62a847c00bca1677a < 797e5371cf55463b4530bab3fef5f27f7c6657a8 ceba1832b1b2da0149c51de62a847c00bca1677a < 1927d0bcd5b81e80971bf6b8eba267508bd1c78b ceba1832b1b2da0149c51de62a847c00bca1677a < 3ba9cf69de50e8abed32b448616c313baa4c5712 ceba1832b1b2da0149c51de62a847c00bca1677a < 9fe3839588db7519030377b7dee3f165e654f6c5 ceba1832b1b2da0149c51de62a847c00bca1677a < 172a8a996a337206970467e871dd995ac07640b1 ceba1832b1b2da0149c51de62a847c00bca1677a < 078aabd567de3d63d37d7673f714e309d369e6e2
Linux / Linux
4.8

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/1ad9166cab6a0f5c0b10344a97bdf749ae11dcbf git.kernel.org: https://git.kernel.org/stable/c/1e38f7a6cdd68377f8a4189b2fbaec14a6dd5152 git.kernel.org: https://git.kernel.org/stable/c/a7e89541d05b98c79a51c0f95df020f8e82b62ed git.kernel.org: https://git.kernel.org/stable/c/797e5371cf55463b4530bab3fef5f27f7c6657a8 git.kernel.org: https://git.kernel.org/stable/c/1927d0bcd5b81e80971bf6b8eba267508bd1c78b git.kernel.org: https://git.kernel.org/stable/c/3ba9cf69de50e8abed32b448616c313baa4c5712 git.kernel.org: https://git.kernel.org/stable/c/9fe3839588db7519030377b7dee3f165e654f6c5 git.kernel.org: https://git.kernel.org/stable/c/172a8a996a337206970467e871dd995ac07640b1 git.kernel.org: https://git.kernel.org/stable/c/078aabd567de3d63d37d7673f714e309d369e6e2 lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html