In the Linux kernel, the following vulnerability has been resolved:atm: clip: Fix potential null-ptr-deref in to_atmarpd().atmarpd is protected by RTNL since commit f3a0592b37b8 ( [ATM]: clipcauses unregister hang ).However, it is not enough because to_atmarpd() is called without RTNL,especially clip_neigh_solicit() / neigh_ops->solicit() is unsleepable.Also, there is no RTNL dependency around atmarpd.Let s use a private mutex and RCU to protect access to atmarpd into_atmarpd().
In the Linux kernel, the following vulnerability has been resolved:atm: clip: Fix potential null-ptr-deref in to_atmarpd().atmarpd is protected by RTNL since commit f3a0592b37b8 ( [ATM]: clipcauses unregister hang ).However, it is not enough because to_atmarpd() is called without RTNL,especially clip_neigh_solicit() / neigh_ops->solicit() is unsleepable.Also, there is no RTNL dependency around atmarpd.Let s use a private mutex and RCU to protect access to atmarpd into_atmarpd().
In the Linux kernel, the following vulnerability has been resolved:atm: clip: Fix potential null-ptr-deref in to_atmarpd().atmarpd is protected by RTNL since commit f3a0592b37b8 ( [ATM]: clipcauses unregister hang ).However, it is not enough because to_atmarpd() is called without RTNL,especially clip_neigh_solicit() / neigh_ops->solicit() is unsleepable.Also, there is no RTNL dependency around atmarpd.Let s use a private mutex and RCU to protect access to atmarpd into_atmarpd().
In the Linux kernel, the following vulnerability has been resolved:atm: clip: Fix potential null-ptr-deref in to_atmarpd().atmarpd is protected by RTNL since commit f3a0592b37b8 ( [ATM]: clipcauses unregister hang ).However, it is not enough because to_atmarpd() is called without RTNL,especially clip_neigh_solicit() / neigh_ops->solicit() is unsleepable.Also, there is no RTNL dependency around atmarpd.Let s use a private mutex and RCU to protect access to atmarpd into_atmarpd().
In the Linux kernel, the following vulnerability has been resolved:atm: clip: Fix potential null-ptr-deref in to_atmarpd().atmarpd is protected by RTNL since commit f3a0592b37b8 ( [ATM]: clipcauses unregister hang ).However, it is not enough because to_atmarpd() is called without RTNL,especially clip_neigh_solicit() / neigh_ops->solicit() is unsleepable.Also, there is no RTNL dependency around atmarpd.Let s use a private mutex and RCU to protect access to atmarpd into_atmarpd().
In the Linux kernel, the following vulnerability has been resolved:atm: clip: Fix potential null-ptr-deref in to_atmarpd().atmarpd is protected by RTNL since commit f3a0592b37b8 ( [ATM]: clipcauses unregister hang ).However, it is not enough because to_atmarpd() is called without RTNL,especially clip_neigh_solicit() / neigh_ops->solicit() is unsleepable.Also, there is no RTNL dependency around atmarpd.Let s use a private mutex and RCU to protect access to atmarpd into_atmarpd().
In the Linux kernel, the following vulnerability has been resolved:atm: clip: Fix potential null-ptr-deref in to_atmarpd().atmarpd is protected by RTNL since commit f3a0592b37b8 ( [ATM]: clipcauses unregister hang ).However, it is not enough because to_atmarpd() is called without RTNL,especially clip_neigh_solicit() / neigh_ops->solicit() is unsleepable.Also, there is no RTNL dependency around atmarpd.Let s use a private mutex and RCU to protect access to atmarpd into_atmarpd().
In the Linux kernel, the following vulnerability has been resolved:atm: clip: Fix potential null-ptr-deref in to_atmarpd().atmarpd is protected by RTNL since commit f3a0592b37b8 ( [ATM]: clipcauses unregister hang ).However, it is not enough because to_atmarpd() is called without RTNL,especially clip_neigh_solicit() / neigh_ops->solicit() is unsleepable.Also, there is no RTNL dependency around atmarpd.Let s use a private mutex and RCU to protect access to atmarpd into_atmarpd().
In the Linux kernel, the following vulnerability has been resolved:atm: clip: Fix potential null-ptr-deref in to_atmarpd().atmarpd is protected by RTNL since commit f3a0592b37b8 ( [ATM]: clipcauses unregister hang ).However, it is not enough because to_atmarpd() is called without RTNL,especially clip_neigh_solicit() / neigh_ops->solicit() is unsleepable.Also, there is no RTNL dependency around atmarpd.Let s use a private mutex and RCU to protect access to atmarpd into_atmarpd().
In the Linux kernel, the following vulnerability has been resolved:atm: clip: Fix potential null-ptr-deref in to_atmarpd().atmarpd is protected by RTNL since commit f3a0592b37b8 ( [ATM]: clipcauses unregister hang ).However, it is not enough because to_atmarpd() is called without RTNL,especially clip_neigh_solicit() / neigh_ops->solicit() is unsleepable.Also, there is no RTNL dependency around atmarpd.Let s use a private mutex and RCU to protect access to atmarpd into_atmarpd().
In the Linux kernel, the following vulnerabilityhas beenresolved:atm: clip: Fix potential null-ptr-derefin to_atmarpd().atmarpd is protected by RTNLsince commit f3a0592b37b8 ( [ATM]: clipcauses unregister hang ).However, it is not enough because to_atmarpd() is called without RTNL,especially clip_neigh_solicit() / neigh_ops->solicit()is unsleepable.Also, there is no RTNL dependency around atmarpd.Let s use a private mutex and RCU to protect access toatmarpd into_atmarpd().
A vulnerability classified as critical was foundin LinuxKernel up to 6.16-rc5 (Operating System).The CWEdefinition for the vulnerability is CWE-476.A NULL pointer dereference occurs when the application dereferences a pointer that it expects to be valid, but is NULL, typically causing a crash or exit.As an impact it is known to affectavailability.Upgrading to version 5.4.296, 5.10.240, 5.15.189, 6.1.146, 6.6.99, 6.12.39, 6.15.7 or 6.16-rc6 eliminatesthis vulnerability. Applying the patch a4c5785feb979cd996a99cfaad8bf353b2e79301/70eac9ba7ce25d99c1d99bbf4ddb058940f631f9/3251ce3979f41bd228f77a7615f9dd616d06a110/ee4d9e4ddf3f9c4ee2ec0a3aad6196ee36d30e57/06935c50cfa3ac57cce80bba67b6d38ec1406e92/36caab990b69ef4eec1d81c52a19f080b7daa059/f58e4270c73e7f086322978d585ea67c8076ce49/706cc36477139c1616a9b2b96610a8bb520b7119 is able to eliminate this problem. The bugfix is ready for download at git.kernel.org. The best possible mitigation is suggested to be upgrading to the latest version.
A vulnerability classified as critical was found in Linux Kernel up to 6.16-rc5 (Operating System).The CWE definition for the vulnerability is CWE-476. A NULL pointer dereference occurs when the application dereferences a pointer that it expects to be valid, but is NULL, typically causing a crash or exit.As an impact it is known to affect availability.Upgrading to version 5.4.296, 5.10.240, 5.15.189, 6.1.146, 6.6.99, 6.12.39, 6.15.7 or 6.16-rc6 eliminates this vulnerability. Applying the patch a4c5785feb979cd996a99cfaad8bf353b2e79301/70eac9ba7ce25d99c1d99bbf4ddb058940f631f9/3251ce3979f41bd228f77a7615f9dd616d06a110/ee4d9e4ddf3f9c4ee2ec0a3aad6196ee36d30e57/06935c50cfa3ac57cce80bba67b6d38ec1406e92/36caab990b69ef4eec1d81c52a19f080b7daa059/f58e4270c73e7f086322978d585ea67c8076ce49/706cc36477139c1616a9b2b96610a8bb520b7119 is able to eliminate this problem. The bugfix is ready for download at git.kernel.org. The best possible mitigation is suggested to be upgrading to the latest version.
A vulnerability classified as critical was found in Linux Kernel up to 6.16-rc5 (Operating System).The CWE definition for the vulnerability is CWE-476. A NULL pointer dereference occurs when the application dereferences a pointer that it expects to be valid, but is NULL, typically causing a crash or exit.As an impact it is known to affect availability.Upgrading to version 5.4.296, 5.10.240, 5.15.189, 6.1.146, 6.6.99, 6.12.39, 6.15.7 or 6.16-rc6 eliminates this vulnerability. Applying the patch a4c5785feb979cd996a99cfaad8bf353b2e79301/70eac9ba7ce25d99c1d99bbf4ddb058940f631f9/3251ce3979f41bd228f77a7615f9dd616d06a110/ee4d9e4ddf3f9c4ee2ec0a3aad6196ee36d30e57/06935c50cfa3ac57cce80bba67b6d38ec1406e92/36caab990b69ef4eec1d81c52a19f080b7daa059/f58e4270c73e7f086322978d585ea67c8076ce49/706cc36477139c1616a9b2b96610a8bb520b7119 is able to eliminate this problem. The bugfix is ready for download at git.kernel.org. The best possible mitigation is suggested to be upgrading to the latest version.
A vulnerability classified as critical was found in Linux Kernel up to 6.16-rc5 (Operating System).The CWE definition for the vulnerability is CWE-476. A NULL pointer dereference occurs when the application dereferences a pointer that it expects to be valid, but is NULL, typically causing a crash or exit.As an impact it is known to affect availability.Upgrading to version 5.4.296, 5.10.240, 5.15.189, 6.1.146, 6.6.99, 6.12.39, 6.15.7 or 6.16-rc6 eliminates this vulnerability. Applying the patch a4c5785feb979cd996a99cfaad8bf353b2e79301/70eac9ba7ce25d99c1d99bbf4ddb058940f631f9/3251ce3979f41bd228f77a7615f9dd616d06a110/ee4d9e4ddf3f9c4ee2ec0a3aad6196ee36d30e57/06935c50cfa3ac57cce80bba67b6d38ec1406e92/36caab990b69ef4eec1d81c52a19f080b7daa059/f58e4270c73e7f086322978d585ea67c8076ce49/706cc36477139c1616a9b2b96610a8bb520b7119 is able to eliminate this problem. The bugfix is ready for download at git.kernel.org. The best possible mitigation is suggested to be upgrading to the latest version.
A vulnerability classified as critical was found in Linux Kernel up to 6.16-rc5 (Operating System).The CWE definition for the vulnerability is CWE-476. A NULL pointer dereference occurs when the application dereferences a pointer that it expects to be valid, but is NULL, typically causing a crash or exit.As an impact it is known to affect availability.Upgrading to version 5.4.296, 5.10.240, 5.15.189, 6.1.146, 6.6.99, 6.12.39, 6.15.7 or 6.16-rc6 eliminates this vulnerability. Applying the patch a4c5785feb979cd996a99cfaad8bf353b2e79301/70eac9ba7ce25d99c1d99bbf4ddb058940f631f9/3251ce3979f41bd228f77a7615f9dd616d06a110/ee4d9e4ddf3f9c4ee2ec0a3aad6196ee36d30e57/06935c50cfa3ac57cce80bba67b6d38ec1406e92/36caab990b69ef4eec1d81c52a19f080b7daa059/f58e4270c73e7f086322978d585ea67c8076ce49/706cc36477139c1616a9b2b96610a8bb520b7119 is able to eliminate this problem. The bugfix is ready for download at git.kernel.org. The best possible mitigation is suggested to be upgrading to the latest version.
A vulnerability classified as critical was foundin LinuxKernel up to 6.16-rc5 (Operating System).The CWEdefinition for the vulnerability is CWE-476.A NULL pointer dereference occurs when the application dereferences a pointer that it expects to be valid, but is NULL, typically causing a crash or exit.As an impact it is known to affectavailability.Upgrading to version 5.4.296, 5.10.240, 5.15.189, 6.1.146, 6.6.99, 6.12.39, 6.15.7 or 6.16-rc6 eliminatesthis vulnerability. Applying the patch a4c5785feb979cd996a99cfaad8bf353b2e79301/70eac9ba7ce25d99c1d99bbf4ddb058940f631f9/3251ce3979f41bd228f77a7615f9dd616d06a110/ee4d9e4ddf3f9c4ee2ec0a3aad6196ee36d30e57/06935c50cfa3ac57cce80bba67b6d38ec1406e92/36caab990b69ef4eec1d81c52a19f080b7daa059/f58e4270c73e7f086322978d585ea67c8076ce49/706cc36477139c1616a9b2b96610a8bb520b7119 is able to eliminate this problem. The bugfix is ready for download at git.kernel.org. The best possible mitigation is suggested to be upgrading to the latest version.
In the Linux kernel, the following vulnerabilityhas beenresolved:atm: clip: Fix potential null-ptr-derefin to_atmarpd().atmarpd is protected by RTNLsince commit f3a0592b37b8 ( [ATM]: clipcauses unregister hang ).However, it is not enough because to_atmarpd() is called without RTNL,especially clip_neigh_solicit() / neigh_ops->solicit()is unsleepable.Also, there is no RTNL dependency around atmarpd.Let s use a private mutex and RCU to protect access toatmarpd into_atmarpd().
In the Linux kernel, the following vulnerabilityhas beenresolved:atm: clip: Fix potential null-ptr-derefin to_atmarpd().atmarpd is protected by RTNLsince commit f3a0592b37b8 ( [ATM]: clipcauses unregister hang ).However, it is not enough because to_atmarpd() is called without RTNL,especially clip_neigh_solicit() / neigh_ops->solicit()is unsleepable.Also, there is no RTNL dependency around atmarpd.Let s use a private mutex and RCU to protect access toatmarpd into_atmarpd().
A vulnerability classified as critical was foundin LinuxKernel up to 6.16-rc5 (Operating System).The CWEdefinition for the vulnerability is CWE-476.A NULL pointer dereference occurs when the application dereferences a pointer that it expects to be valid, but is NULL, typically causing a crash or exit.As an impact it is known to affectavailability.Upgrading to version 5.4.296, 5.10.240, 5.15.189, 6.1.146, 6.6.99, 6.12.39, 6.15.7 or 6.16-rc6 eliminatesthis vulnerability. Applying the patch a4c5785feb979cd996a99cfaad8bf353b2e79301/70eac9ba7ce25d99c1d99bbf4ddb058940f631f9/3251ce3979f41bd228f77a7615f9dd616d06a110/ee4d9e4ddf3f9c4ee2ec0a3aad6196ee36d30e57/06935c50cfa3ac57cce80bba67b6d38ec1406e92/36caab990b69ef4eec1d81c52a19f080b7daa059/f58e4270c73e7f086322978d585ea67c8076ce49/706cc36477139c1616a9b2b96610a8bb520b7119 is able to eliminate this problem. The bugfix is ready for download at git.kernel.org. The best possible mitigation is suggested to be upgrading to the latest version.
A vulnerability classified as critical was foundin LinuxKernel up to 6.16-rc5 (Operating System).The CWEdefinition for the vulnerability is CWE-476.A NULL pointer dereference occurs when the application dereferences a pointer that it expects to be valid, but is NULL, typically causing a crash or exit.As an impact it is known to affectavailability.Upgrading to version 5.4.296, 5.10.240, 5.15.189, 6.1.146, 6.6.99, 6.12.39, 6.15.7 or 6.16-rc6 eliminatesthis vulnerability. Applying the patch a4c5785feb979cd996a99cfaad8bf353b2e79301/70eac9ba7ce25d99c1d99bbf4ddb058940f631f9/3251ce3979f41bd228f77a7615f9dd616d06a110/ee4d9e4ddf3f9c4ee2ec0a3aad6196ee36d30e57/06935c50cfa3ac57cce80bba67b6d38ec1406e92/36caab990b69ef4eec1d81c52a19f080b7daa059/f58e4270c73e7f086322978d585ea67c8076ce49/706cc36477139c1616a9b2b96610a8bb520b7119 is able to eliminate this problem. The bugfix is ready for download at git.kernel.org. The best possible mitigation is suggested to be upgrading to the latest version.
In the Linux kernel, the following vulnerabilityhas beenresolved:atm: clip: Fix potential null-ptr-derefin to_atmarpd().atmarpd is protected by RTNLsince commit f3a0592b37b8 ( [ATM]: clipcauses unregister hang ).However, it is not enough because to_atmarpd() is called without RTNL,especially clip_neigh_solicit() / neigh_ops->solicit()is unsleepable.Also, there is no RTNL dependency around atmarpd.Let s use a private mutex and RCU to protect access toatmarpd into_atmarpd().
In the Linux kernel, the following vulnerabilityhas beenresolved:atm: clip: Fix potential null-ptr-derefin to_atmarpd().atmarpd is protected by RTNLsince commit f3a0592b37b8 ( [ATM]: clipcauses unregister hang ).However, it is not enough because to_atmarpd() is called without RTNL,especially clip_neigh_solicit() / neigh_ops->solicit()is unsleepable.Also, there is no RTNL dependency around atmarpd.Let s use a private mutex and RCU to protect access toatmarpd into_atmarpd().
A vulnerability classified as critical was foundin LinuxKernel up to 6.16-rc5 (Operating System).The CWEdefinition for the vulnerability is CWE-476.A NULL pointer dereference occurs when the application dereferences a pointer that it expects to be valid, but is NULL, typically causing a crash or exit.As an impact it is known to affectavailability.Upgrading to version 5.4.296, 5.10.240, 5.15.189, 6.1.146, 6.6.99, 6.12.39, 6.15.7 or 6.16-rc6 eliminatesthis vulnerability. Applying the patch a4c5785feb979cd996a99cfaad8bf353b2e79301/70eac9ba7ce25d99c1d99bbf4ddb058940f631f9/3251ce3979f41bd228f77a7615f9dd616d06a110/ee4d9e4ddf3f9c4ee2ec0a3aad6196ee36d30e57/06935c50cfa3ac57cce80bba67b6d38ec1406e92/36caab990b69ef4eec1d81c52a19f080b7daa059/f58e4270c73e7f086322978d585ea67c8076ce49/706cc36477139c1616a9b2b96610a8bb520b7119 is able to eliminate this problem. The bugfix is ready for download at git.kernel.org. The best possible mitigation is suggested to be upgrading to the latest version.
A vulnerability classified as critical was foundin LinuxKernel up to 6.16-rc5 (Operating System).The CWEdefinition for the vulnerability is CWE-476.A NULL pointer dereference occurs when the application dereferences a pointer that it expects to be valid, but is NULL, typically causing a crash or exit.As an impact it is known to affectavailability.Upgrading to version 5.4.296, 5.10.240, 5.15.189, 6.1.146, 6.6.99, 6.12.39, 6.15.7 or 6.16-rc6 eliminatesthis vulnerability. Applying the patch a4c5785feb979cd996a99cfaad8bf353b2e79301/70eac9ba7ce25d99c1d99bbf4ddb058940f631f9/3251ce3979f41bd228f77a7615f9dd616d06a110/ee4d9e4ddf3f9c4ee2ec0a3aad6196ee36d30e57/06935c50cfa3ac57cce80bba67b6d38ec1406e92/36caab990b69ef4eec1d81c52a19f080b7daa059/f58e4270c73e7f086322978d585ea67c8076ce49/706cc36477139c1616a9b2b96610a8bb520b7119 is able to eliminate this problem. The bugfix is ready for download at git.kernel.org. The best possible mitigation is suggested to be upgrading to the latest version.
In the Linux kernel, the following vulnerabilityhas beenresolved:atm: clip: Fix potential null-ptr-derefin to_atmarpd().atmarpd is protected by RTNLsince commit f3a0592b37b8 ( [ATM]: clipcauses unregister hang ).However, it is not enough because to_atmarpd() is called without RTNL,especially clip_neigh_solicit() / neigh_ops->solicit()is unsleepable.Also, there is no RTNL dependency around atmarpd.Let s use a private mutex and RCU to protect access toatmarpd into_atmarpd().
In the Linux kernel, the following vulnerabilityhas beenresolved:atm: clip: Fix potential null-ptr-derefin to_atmarpd().atmarpd is protected by RTNLsince commit f3a0592b37b8 ( [ATM]: clipcauses unregister hang ).However, it is not enough because to_atmarpd() is called without RTNL,especially clip_neigh_solicit() / neigh_ops->solicit()is unsleepable.Also, there is no RTNL dependency around atmarpd.Let s use a private mutex and RCU to protect access toatmarpd into_atmarpd().
A vulnerability classified as critical was foundin LinuxKernel up to 6.16-rc5 (Operating System).The CWEdefinition for the vulnerability is CWE-476.A NULL pointer dereference occurs when the application dereferences a pointer that it expects to be valid, but is NULL, typically causing a crash or exit.As an impact it is known to affectavailability.Upgrading to version 5.4.296, 5.10.240, 5.15.189, 6.1.146, 6.6.99, 6.12.39, 6.15.7 or 6.16-rc6 eliminatesthis vulnerability. Applying the patch a4c5785feb979cd996a99cfaad8bf353b2e79301/70eac9ba7ce25d99c1d99bbf4ddb058940f631f9/3251ce3979f41bd228f77a7615f9dd616d06a110/ee4d9e4ddf3f9c4ee2ec0a3aad6196ee36d30e57/06935c50cfa3ac57cce80bba67b6d38ec1406e92/36caab990b69ef4eec1d81c52a19f080b7daa059/f58e4270c73e7f086322978d585ea67c8076ce49/706cc36477139c1616a9b2b96610a8bb520b7119 is able to eliminate this problem. The bugfix is ready for download at git.kernel.org. The best possible mitigation is suggested to be upgrading to the latest version.
A vulnerability classified as critical was foundin LinuxKernel up to 6.16-rc5 (Operating System).The CWEdefinition for the vulnerability is CWE-476.A NULL pointer dereference occurs when the application dereferences a pointer that it expects to be valid, but is NULL, typically causing a crash or exit.As an impact it is known to affectavailability.Upgrading to version 5.4.296, 5.10.240, 5.15.189, 6.1.146, 6.6.99, 6.12.39, 6.15.7 or 6.16-rc6 eliminatesthis vulnerability. Applying the patch a4c5785feb979cd996a99cfaad8bf353b2e79301/70eac9ba7ce25d99c1d99bbf4ddb058940f631f9/3251ce3979f41bd228f77a7615f9dd616d06a110/ee4d9e4ddf3f9c4ee2ec0a3aad6196ee36d30e57/06935c50cfa3ac57cce80bba67b6d38ec1406e92/36caab990b69ef4eec1d81c52a19f080b7daa059/f58e4270c73e7f086322978d585ea67c8076ce49/706cc36477139c1616a9b2b96610a8bb520b7119 is able to eliminate this problem. The bugfix is ready for download at git.kernel.org. The best possible mitigation is suggested to be upgrading to the latest version.
In the Linux kernel, the following vulnerabilityhas beenresolved:atm: clip: Fix potential null-ptr-derefin to_atmarpd().atmarpd is protected by RTNLsince commit f3a0592b37b8 ( [ATM]: clipcauses unregister hang ).However, it is not enough because to_atmarpd() is called without RTNL,especially clip_neigh_solicit() / neigh_ops->solicit()is unsleepable.Also, there is no RTNL dependency around atmarpd.Let s use a private mutex and RCU to protect access toatmarpd into_atmarpd().
In the Linux kernel, the following vulnerabilityhas beenresolved:atm: clip: Fix potential null-ptr-derefin to_atmarpd().atmarpd is protected by RTNLsince commit f3a0592b37b8 ( [ATM]: clipcauses unregister hang ).However, it is not enough because to_atmarpd() is called without RTNL,especially clip_neigh_solicit() / neigh_ops->solicit()is unsleepable.Also, there is no RTNL dependency around atmarpd.Let s use a private mutex and RCU to protect access toatmarpd into_atmarpd().
A vulnerability classified as critical was foundin LinuxKernel up to 6.16-rc5 (Operating System).The CWEdefinition for the vulnerability is CWE-476.A NULL pointer dereference occurs when the application dereferences a pointer that it expects to be valid, but is NULL, typically causing a crash or exit.As an impact it is known to affectavailability.Upgrading to version 5.4.296, 5.10.240, 5.15.189, 6.1.146, 6.6.99, 6.12.39, 6.15.7 or 6.16-rc6 eliminatesthis vulnerability. Applying the patch a4c5785feb979cd996a99cfaad8bf353b2e79301/70eac9ba7ce25d99c1d99bbf4ddb058940f631f9/3251ce3979f41bd228f77a7615f9dd616d06a110/ee4d9e4ddf3f9c4ee2ec0a3aad6196ee36d30e57/06935c50cfa3ac57cce80bba67b6d38ec1406e92/36caab990b69ef4eec1d81c52a19f080b7daa059/f58e4270c73e7f086322978d585ea67c8076ce49/706cc36477139c1616a9b2b96610a8bb520b7119 is able to eliminate this problem. The bugfix is ready for download at git.kernel.org. The best possible mitigation is suggested to be upgrading to the latest version.
A vulnerability classified as critical was foundin LinuxKernel up to 6.16-rc5 (Operating System).The CWEdefinition for the vulnerability is CWE-476.A NULL pointer dereference occurs when the application dereferences a pointer that it expects to be valid, but is NULL, typically causing a crash or exit.As an impact it is known to affectavailability.Upgrading to version 5.4.296, 5.10.240, 5.15.189, 6.1.146, 6.6.99, 6.12.39, 6.15.7 or 6.16-rc6 eliminatesthis vulnerability. Applying the patch a4c5785feb979cd996a99cfaad8bf353b2e79301/70eac9ba7ce25d99c1d99bbf4ddb058940f631f9/3251ce3979f41bd228f77a7615f9dd616d06a110/ee4d9e4ddf3f9c4ee2ec0a3aad6196ee36d30e57/06935c50cfa3ac57cce80bba67b6d38ec1406e92/36caab990b69ef4eec1d81c52a19f080b7daa059/f58e4270c73e7f086322978d585ea67c8076ce49/706cc36477139c1616a9b2b96610a8bb520b7119 is able to eliminate this problem. The bugfix is ready for download at git.kernel.org. The best possible mitigation is suggested to be upgrading to the latest version.
In the Linux kernel, the following vulnerabilityhas beenresolved:atm: clip: Fix potential null-ptr-derefin to_atmarpd().atmarpd is protected by RTNLsince commit f3a0592b37b8 ( [ATM]: clipcauses unregister hang ).However, it is not enough because to_atmarpd() is called without RTNL,especially clip_neigh_solicit() / neigh_ops->solicit()is unsleepable.Also, there is no RTNL dependency around atmarpd.Let s use a private mutex and RCU to protect access toatmarpd into_atmarpd().
In the Linux kernel, the following vulnerabilityhas beenresolved:atm: clip: Fix potential null-ptr-derefin to_atmarpd().atmarpd is protected by RTNLsince commit f3a0592b37b8 ( [ATM]: clipcauses unregister hang ).However, it is not enough because to_atmarpd() is called without RTNL,especially clip_neigh_solicit() / neigh_ops->solicit()is unsleepable.Also, there is no RTNL dependency around atmarpd.Let s use a private mutex and RCU to protect access toatmarpd into_atmarpd().
A vulnerability classified as critical was foundin LinuxKernel up to 6.16-rc5 (Operating System).The CWEdefinition for the vulnerability is CWE-476.A NULL pointer dereference occurs when the application dereferences a pointer that it expects to be valid, but is NULL, typically causing a crash or exit.As an impact it is known to affectavailability.Upgrading to version 5.4.296, 5.10.240, 5.15.189, 6.1.146, 6.6.99, 6.12.39, 6.15.7 or 6.16-rc6 eliminatesthis vulnerability. Applying the patch a4c5785feb979cd996a99cfaad8bf353b2e79301/70eac9ba7ce25d99c1d99bbf4ddb058940f631f9/3251ce3979f41bd228f77a7615f9dd616d06a110/ee4d9e4ddf3f9c4ee2ec0a3aad6196ee36d30e57/06935c50cfa3ac57cce80bba67b6d38ec1406e92/36caab990b69ef4eec1d81c52a19f080b7daa059/f58e4270c73e7f086322978d585ea67c8076ce49/706cc36477139c1616a9b2b96610a8bb520b7119 is able to eliminate this problem. The bugfix is ready for download at git.kernel.org. The best possible mitigation is suggested to be upgrading to the latest version.
A vulnerability classified as critical was foundin LinuxKernel up to 6.16-rc5 (Operating System).The CWEdefinition for the vulnerability is CWE-476.A NULL pointer dereference occurs when the application dereferences a pointer that it expects to be valid, but is NULL, typically causing a crash or exit.As an impact it is known to affectavailability.Upgrading to version 5.4.296, 5.10.240, 5.15.189, 6.1.146, 6.6.99, 6.12.39, 6.15.7 or 6.16-rc6 eliminatesthis vulnerability. Applying the patch a4c5785feb979cd996a99cfaad8bf353b2e79301/70eac9ba7ce25d99c1d99bbf4ddb058940f631f9/3251ce3979f41bd228f77a7615f9dd616d06a110/ee4d9e4ddf3f9c4ee2ec0a3aad6196ee36d30e57/06935c50cfa3ac57cce80bba67b6d38ec1406e92/36caab990b69ef4eec1d81c52a19f080b7daa059/f58e4270c73e7f086322978d585ea67c8076ce49/706cc36477139c1616a9b2b96610a8bb520b7119 is able to eliminate this problem. The bugfix is ready for download at git.kernel.org. The best possible mitigation is suggested to be upgrading to the latest version.
In the Linux kernel, the following vulnerabilityhas beenresolved:atm: clip: Fix potential null-ptr-derefin to_atmarpd().atmarpd is protected by RTNLsince commit f3a0592b37b8 ( [ATM]: clipcauses unregister hang ).However, it is not enough because to_atmarpd() is called without RTNL,especially clip_neigh_solicit() / neigh_ops->solicit()is unsleepable.Also, there is no RTNL dependency around atmarpd.Let s use a private mutex and RCU to protect access toatmarpd into_atmarpd().