SB20250502204 - NULL pointer dereference in Linux kernel mptcp
Published: May 2, 2025 Updated: May 10, 2025
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) NULL pointer dereference (CVE-ID: CVE-2025-23145)
The vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the subflow_hmac_valid() and subflow_syn_recv_sock() functions in net/mptcp/subflow.c. A local user can perform a denial of service (DoS) attack.
Remediation
Install update from vendor's website.
References
- https://git.kernel.org/stable/c/443041deb5ef6a1289a99ed95015ec7442f141dc
- https://git.kernel.org/stable/c/4b2649b9717678aeb097893cc49f59311a1ecab0
- https://git.kernel.org/stable/c/7f9ae060ed64aef8f174c5f1ea513825b1be9af1
- https://git.kernel.org/stable/c/855bf0aacd51fced11ea9aa0d5101ee0febaeadb
- https://git.kernel.org/stable/c/8cf7fef1bb2ffea7792bcbf71ca00216cecc725d
- https://git.kernel.org/stable/c/b3088bd2a6790c8efff139d86d7a9d0b1305977b
- https://git.kernel.org/stable/c/dc81e41a307df523072186b241fa8244fecd7803
- https://git.kernel.org/stable/c/efd58a8dd9e7a709a90ee486a4247c923d27296f
- https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.13.12