NULL Pointer Dereference Affecting linux-virt-doc package, versions <6.12.11-r0


Severity

Recommended
0.0
medium
0
10

Snyk's Security Team recommends NVD's CVSS assessment. Learn more

Threat Intelligence

EPSS
0.03% (8th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about NULL Pointer Dereference vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-MINIMOSLATEST-LINUXVIRTDOC-13326334
  • published6 Oct 2025
  • disclosed19 Jan 2025

Introduced: 19 Jan 2025

CVE-2025-21641  (opens in a new tab)
CWE-476  (opens in a new tab)

How to fix?

Upgrade Minimos:latest linux-virt-doc to version 6.12.11-r0 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream linux-virt-doc package and not the linux-virt-doc package as distributed by Minimos. See How to fix? for Minimos:latest relevant fixed versions and status.

In the Linux kernel, the following vulnerability has been resolved:

mptcp: sysctl: blackhole timeout: avoid using current->nsproxy

As mentioned in the previous commit, using the 'net' structure via 'current' is not recommended for different reasons:

  • Inconsistency: getting info from the reader's/writer's netns vs only from the opener's netns.

  • current->nsproxy can be NULL in some cases, resulting in an 'Oops' (null-ptr-deref), e.g. when the current task is exiting, as spotted by syzbot [1] using acct(2).

The 'pernet' structure can be obtained from the table->data using container_of().

CVSS Base Scores

version 3.1