CVE Vulnerabilities

CVE-2025-14769

NULL Pointer Dereference

Published: Mar 09, 2026 | Modified: Mar 09, 2026
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
RedHat/V2
RedHat/V3
Ubuntu
root.io logo minimus.io logo echo.ai logo

In some cases, the tcp-setmss handler may free the packet data and throw an error without halting the rule processing engine. A subsequent rule can then allow the traffic after the packet data is gone, resulting in a NULL pointer dereference.

Maliciously crafted packets sent from a remote host may result in a Denial of Service (DoS) if the tcp-setmss directive is used and a subsequent rule would allow the traffic to pass.

Weakness

The product dereferences a pointer that it expects to be valid but is NULL.

Potential Mitigations

References