netlabel: Fix NULL pointer exception caused by CALIPSO on IPv4 sockets
When calling netlbl_conn_setattr(), addr->sa_family is used
to determine the function behavior. If sk is an IPv4 socket,
but the connect function is called with an IPv6 address,
the function calipso_sock_setattr() is triggered.
Inside this function, the following code is executed:
sk_fullsock(__sk) ? inet_sk(__sk)->pinet6 : NULL;
Since sk is an IPv4 socket, pinet6 is NULL, leading to a
null pointer dereference.
This patch fixes the issue by checking if inet6_sk(sk)
returns a NULL pointer before accessing pinet6.
Metrics
Affected Vendors & Products
| Source | ID | Title | 
|---|---|---|
  Debian DLA | 
                DLA-4178-1 | linux security update | 
  Debian DLA | 
                DLA-4193-1 | linux-6.1 security update | 
  Debian DSA | 
                DSA-5907-1 | linux security update | 
  EUVD | 
                EUVD-2025-11235 | In the Linux kernel, the following vulnerability has been resolved: netlabel: Fix NULL pointer exception caused by CALIPSO on IPv4 sockets When calling netlbl_conn_setattr(), addr->sa_family is used to determine the function behavior. If sk is an IPv4 socket, but the connect function is called with an IPv6 address, the function calipso_sock_setattr() is triggered. Inside this function, the following code is executed: sk_fullsock(__sk) ? inet_sk(__sk)->pinet6 : NULL; Since sk is an IPv4 socket, pinet6 is NULL, leading to a null pointer dereference. This patch fixes the issue by checking if inet6_sk(sk) returns a NULL pointer before accessing pinet6. | 
  Ubuntu USN | 
                USN-7585-1 | Linux kernel vulnerabilities | 
  Ubuntu USN | 
                USN-7585-2 | Linux kernel (FIPS) vulnerabilities | 
  Ubuntu USN | 
                USN-7585-3 | Linux kernel (FIPS) vulnerabilities | 
  Ubuntu USN | 
                USN-7585-4 | Linux kernel (Azure) vulnerabilities | 
  Ubuntu USN | 
                USN-7585-5 | Linux kernel (HWE) vulnerabilities | 
  Ubuntu USN | 
                USN-7585-6 | Linux kernel (BlueField) vulnerabilities | 
  Ubuntu USN | 
                USN-7585-7 | Linux kernel (Raspberry Pi) vulnerabilities | 
  Ubuntu USN | 
                USN-7591-1 | Linux kernel vulnerabilities | 
  Ubuntu USN | 
                USN-7591-2 | Linux kernel (FIPS) vulnerabilities | 
  Ubuntu USN | 
                USN-7591-3 | Linux kernel (Real-time) vulnerabilities | 
  Ubuntu USN | 
                USN-7591-4 | Linux kernel (AWS) vulnerabilities | 
  Ubuntu USN | 
                USN-7591-5 | Linux kernel (Intel IoTG) vulnerabilities | 
  Ubuntu USN | 
                USN-7591-6 | Linux kernel (Raspberry Pi) vulnerabilities | 
  Ubuntu USN | 
                USN-7592-1 | Linux kernel vulnerabilities | 
  Ubuntu USN | 
                USN-7593-1 | Linux kernel (HWE) vulnerabilities | 
  Ubuntu USN | 
                USN-7594-1 | Linux kernel vulnerabilities | 
  Ubuntu USN | 
                USN-7594-2 | Linux kernel (Azure) vulnerabilities | 
  Ubuntu USN | 
                USN-7594-3 | Linux kernel vulnerabilities | 
  Ubuntu USN | 
                USN-7597-1 | Linux kernel (Azure) vulnerabilities | 
  Ubuntu USN | 
                USN-7597-2 | Linux kernel (Azure FIPS) vulnerabilities | 
  Ubuntu USN | 
                USN-7598-1 | Linux kernel (Azure) vulnerabilities | 
  Ubuntu USN | 
                USN-7602-1 | Linux kernel (Xilinx ZynqMP) vulnerabilities | 
  Ubuntu USN | 
                USN-7605-1 | Linux kernel vulnerabilities | 
  Ubuntu USN | 
                USN-7605-2 | Linux kernel (Low Latency) vulnerabilities | 
  Ubuntu USN | 
                USN-7606-1 | Linux kernel (OEM) vulnerabilities | 
  Ubuntu USN | 
                USN-7628-1 | Linux kernel (Azure) vulnerabilities | 
  Ubuntu USN | 
                USN-7640-1 | Linux kernel (IoT) vulnerabilities | 
  Ubuntu USN | 
                USN-7655-1 | Linux kernel (Intel IoTG) vulnerabilities | 
  Ubuntu USN | 
                USN-7835-1 | Linux kernel vulnerabilities | 
  Ubuntu USN | 
                USN-7835-2 | Linux kernel (Real-time) vulnerabilities | 
  Ubuntu USN | 
                USN-7835-3 | Linux kernel vulnerabilities | 
  Ubuntu USN | 
                USN-7835-4 | Linux kernel (HWE) vulnerabilities | 
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Mon, 03 Nov 2025 20:30:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| References | 
         | 
Wed, 01 Oct 2025 18:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Metrics | 
        
        ssvc
         
  | 
Tue, 29 Apr 2025 19:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| First Time appeared | 
        
        Linux
         Linux linux Kernel  | 
|
| CPEs | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | |
| Vendors & Products | 
        
        Linux
         Linux linux Kernel  | 
Fri, 25 Apr 2025 16:00:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Weaknesses | CWE-476 | 
Thu, 17 Apr 2025 14:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| References | 
         | |
| Metrics | 
        
        
        threat_severity
         
  | 
    
        
        cvssV3_1
         
 
  | 
Wed, 16 Apr 2025 14:30:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Description | In the Linux kernel, the following vulnerability has been resolved: netlabel: Fix NULL pointer exception caused by CALIPSO on IPv4 sockets When calling netlbl_conn_setattr(), addr->sa_family is used to determine the function behavior. If sk is an IPv4 socket, but the connect function is called with an IPv6 address, the function calipso_sock_setattr() is triggered. Inside this function, the following code is executed: sk_fullsock(__sk) ? inet_sk(__sk)->pinet6 : NULL; Since sk is an IPv4 socket, pinet6 is NULL, leading to a null pointer dereference. This patch fixes the issue by checking if inet6_sk(sk) returns a NULL pointer before accessing pinet6. | |
| Title | netlabel: Fix NULL pointer exception caused by CALIPSO on IPv4 sockets | |
| References | 
         | 
        
  | 
Status: PUBLISHED
Assigner: Linux
Published:
Updated: 2025-11-03T19:41:48.111Z
Reserved: 2024-12-29T08:45:45.813Z
Link: CVE-2025-22063
Updated: 2025-10-01T14:40:58.485Z
Status : Modified
Published: 2025-04-16T15:15:59.777
Modified: 2025-11-03T20:17:41.320
Link: CVE-2025-22063
                        OpenCVE Enrichment
                    No data.
 Debian DLA
 Debian DSA
 EUVD
 Ubuntu USN