Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Multiple Kernel Versions Null Pointer Dereference Local DoS



The specific kernel version that the system is running is vulnerable to a null pointer dereference which may result in a denial of service.


Linux Kernel contains a NULL pointer dereference flaw in the tipc_nl_publ_dump() function in net/tipc/socket.c that is triggered when parsing nested attributes. This may allow a local attacker to crash the system.


Currently, there are no known workarounds or upgrades to correct this issue. However, a patch has been committed to the source code repository (e.g. GIT, CVS, SVN) that addresses this vulnerability. Until it is incorporated into the next release of the software, manually patching an existing installation is the only known available solution. Check the vendor links in the references section for more information.