In the Linux kernel, the following vulnerability has been resolved:net: ethernet: rtsn: Fix a null pointer dereference in rtsn_probe()Add check for the return value of rcar_gen4_ptp_alloc()to prevent potential null pointer dereference.
In the Linux kernel, the following vulnerability has been resolved:net: ethernet: rtsn: Fix a null pointer dereference in rtsn_probe()Add check for the return value of rcar_gen4_ptp_alloc()to prevent potential null pointer dereference.
In the Linux kernel, the following vulnerability has been resolved:net: ethernet: rtsn: Fix a null pointer dereference in rtsn_probe()Add check for the return value of rcar_gen4_ptp_alloc()to prevent potential null pointer dereference.
In the Linux kernel, the following vulnerability has been resolved:net: ethernet: rtsn: Fix a null pointer dereference in rtsn_probe()Add check for the return value of rcar_gen4_ptp_alloc()to prevent potential null pointer dereference.
In the Linux kernel, the following vulnerability has been resolved:net: ethernet: rtsn: Fix a null pointer dereference in rtsn_probe()Add check for the return value of rcar_gen4_ptp_alloc()to prevent potential null pointer dereference.
In the Linux kernel, the following vulnerability has been resolved:net: ethernet: rtsn: Fix a null pointer dereference in rtsn_probe()Add check for the return value of rcar_gen4_ptp_alloc()to prevent potential null pointer dereference.
In the Linux kernel, the following vulnerability hasbeen resolved:net: ethernet: rtsn:Fix a null pointer dereference in rtsn_probe()Add check for the return value of rcar_gen4_ptp_alloc()to prevent potentialnullpointer dereference.
A vulnerability has been found in Linux Kernel up to6.12.38/6.15.6/6.16-rc5 (OperatingSystem) and classified as critical.The CWE definition for the vulnerability is CWE-476. A NULL pointer dereference occurswhenthe application dereferences a pointer that it expects to be valid, but is NULL, typically causing a crash or exit.As an impact it is known to affect availability.Upgrading to version 6.12.39, 6.15.7 or 6.16-rc6 eliminates this vulnerability. Applying the patch 9f260e16b297f8134c5f90bb5a20e805ff57e853/d52eb4f0e0ca9a5213b8795abbeb11a325d9b22d/95a234f6affbf51f06338383537ab80d637bb785 is able to eliminate this problem. The bugfix is ready for download at git.kernel.org. The best possible mitigation is suggested to be upgrading to the latest version.
A vulnerability has been found in Linux Kernel up to 6.12.38/6.15.6/6.16-rc5 (Operating System) and classified as critical.The CWE definition for the vulnerability is CWE-476. A NULL pointer dereference occurs when the application dereferences a pointer that it expects to be valid, but is NULL, typically causing a crash or exit.As an impact it is known to affect availability.Upgrading to version 6.12.39, 6.15.7 or 6.16-rc6 eliminates this vulnerability. Applying the patch 9f260e16b297f8134c5f90bb5a20e805ff57e853/d52eb4f0e0ca9a5213b8795abbeb11a325d9b22d/95a234f6affbf51f06338383537ab80d637bb785 is able to eliminate this problem. The bugfix is ready for download at git.kernel.org. The best possible mitigation is suggested to be upgrading to the latest version.
A vulnerability has been found in Linux Kernel up to 6.12.38/6.15.6/6.16-rc5 (Operating System) and classified as critical.The CWE definition for the vulnerability is CWE-476. A NULL pointer dereference occurs when the application dereferences a pointer that it expects to be valid, but is NULL, typically causing a crash or exit.As an impact it is known to affect availability.Upgrading to version 6.12.39, 6.15.7 or 6.16-rc6 eliminates this vulnerability. Applying the patch 9f260e16b297f8134c5f90bb5a20e805ff57e853/d52eb4f0e0ca9a5213b8795abbeb11a325d9b22d/95a234f6affbf51f06338383537ab80d637bb785 is able to eliminate this problem. The bugfix is ready for download at git.kernel.org. The best possible mitigation is suggested to be upgrading to the latest version.
A vulnerability has been found in Linux Kernel up to 6.12.38/6.15.6/6.16-rc5 (Operating System) and classified as critical.The CWE definition for the vulnerability is CWE-476. A NULL pointer dereference occurs when the application dereferences a pointer that it expects to be valid, but is NULL, typically causing a crash or exit.As an impact it is known to affect availability.Upgrading to version 6.12.39, 6.15.7 or 6.16-rc6 eliminates this vulnerability. Applying the patch 9f260e16b297f8134c5f90bb5a20e805ff57e853/d52eb4f0e0ca9a5213b8795abbeb11a325d9b22d/95a234f6affbf51f06338383537ab80d637bb785 is able to eliminate this problem. The bugfix is ready for download at git.kernel.org. The best possible mitigation is suggested to be upgrading to the latest version.
A vulnerability has been found in Linux Kernel up to 6.12.38/6.15.6/6.16-rc5 (Operating System) and classified as critical.The CWE definition for the vulnerability is CWE-476. A NULL pointer dereference occurs when the application dereferences a pointer that it expects to be valid, but is NULL, typically causing a crash or exit.As an impact it is known to affect availability.Upgrading to version 6.12.39, 6.15.7 or 6.16-rc6 eliminates this vulnerability. Applying the patch 9f260e16b297f8134c5f90bb5a20e805ff57e853/d52eb4f0e0ca9a5213b8795abbeb11a325d9b22d/95a234f6affbf51f06338383537ab80d637bb785 is able to eliminate this problem. The bugfix is ready for download at git.kernel.org. The best possible mitigation is suggested to be upgrading to the latest version.
A vulnerability has been found in Linux Kernel up to6.12.38/6.15.6/6.16-rc5 (OperatingSystem) and classified as critical.The CWE definition for the vulnerability is CWE-476. A NULL pointer dereference occurswhenthe application dereferences a pointer that it expects to be valid, but is NULL, typically causing a crash or exit.As an impact it is known to affect availability.Upgrading to version 6.12.39, 6.15.7 or 6.16-rc6 eliminates this vulnerability. Applying the patch 9f260e16b297f8134c5f90bb5a20e805ff57e853/d52eb4f0e0ca9a5213b8795abbeb11a325d9b22d/95a234f6affbf51f06338383537ab80d637bb785 is able to eliminate this problem. The bugfix is ready for download at git.kernel.org. The best possible mitigation is suggested to be upgrading to the latest version.
In the Linux kernel, the following vulnerability hasbeen resolved:net: ethernet: rtsn:Fix a null pointer dereference in rtsn_probe()Add check for the return value of rcar_gen4_ptp_alloc()to prevent potentialnullpointer dereference.
In the Linux kernel, the following vulnerability hasbeen resolved:net: ethernet: rtsn:Fix a null pointer dereference in rtsn_probe()Add check for the return value of rcar_gen4_ptp_alloc()to prevent potentialnullpointer dereference.
A vulnerability has been found in Linux Kernel up to6.12.38/6.15.6/6.16-rc5 (OperatingSystem) and classified as critical.The CWE definition for the vulnerability is CWE-476. A NULL pointer dereference occurswhenthe application dereferences a pointer that it expects to be valid, but is NULL, typically causing a crash or exit.As an impact it is known to affect availability.Upgrading to version 6.12.39, 6.15.7 or 6.16-rc6 eliminates this vulnerability. Applying the patch 9f260e16b297f8134c5f90bb5a20e805ff57e853/d52eb4f0e0ca9a5213b8795abbeb11a325d9b22d/95a234f6affbf51f06338383537ab80d637bb785 is able to eliminate this problem. The bugfix is ready for download at git.kernel.org. The best possible mitigation is suggested to be upgrading to the latest version.
A vulnerability has been found in Linux Kernel up to6.12.38/6.15.6/6.16-rc5 (OperatingSystem) and classified as critical.The CWE definition for the vulnerability is CWE-476. A NULL pointer dereference occurswhenthe application dereferences a pointer that it expects to be valid, but is NULL, typically causing a crash or exit.As an impact it is known to affect availability.Upgrading to version 6.12.39, 6.15.7 or 6.16-rc6 eliminates this vulnerability. Applying the patch 9f260e16b297f8134c5f90bb5a20e805ff57e853/d52eb4f0e0ca9a5213b8795abbeb11a325d9b22d/95a234f6affbf51f06338383537ab80d637bb785 is able to eliminate this problem. The bugfix is ready for download at git.kernel.org. The best possible mitigation is suggested to be upgrading to the latest version.
In the Linux kernel, the following vulnerability hasbeen resolved:net: ethernet: rtsn:Fix a null pointer dereference in rtsn_probe()Add check for the return value of rcar_gen4_ptp_alloc()to prevent potentialnullpointer dereference.
In the Linux kernel, the following vulnerability hasbeen resolved:net: ethernet: rtsn:Fix a null pointer dereference in rtsn_probe()Add check for the return value of rcar_gen4_ptp_alloc()to prevent potentialnullpointer dereference.
A vulnerability has been found in Linux Kernel up to6.12.38/6.15.6/6.16-rc5 (OperatingSystem) and classified as critical.The CWE definition for the vulnerability is CWE-476. A NULL pointer dereference occurswhenthe application dereferences a pointer that it expects to be valid, but is NULL, typically causing a crash or exit.As an impact it is known to affect availability.Upgrading to version 6.12.39, 6.15.7 or 6.16-rc6 eliminates this vulnerability. Applying the patch 9f260e16b297f8134c5f90bb5a20e805ff57e853/d52eb4f0e0ca9a5213b8795abbeb11a325d9b22d/95a234f6affbf51f06338383537ab80d637bb785 is able to eliminate this problem. The bugfix is ready for download at git.kernel.org. The best possible mitigation is suggested to be upgrading to the latest version.
A vulnerability has been found in Linux Kernel up to6.12.38/6.15.6/6.16-rc5 (OperatingSystem) and classified as critical.The CWE definition for the vulnerability is CWE-476. A NULL pointer dereference occurswhenthe application dereferences a pointer that it expects to be valid, but is NULL, typically causing a crash or exit.As an impact it is known to affect availability.Upgrading to version 6.12.39, 6.15.7 or 6.16-rc6 eliminates this vulnerability. Applying the patch 9f260e16b297f8134c5f90bb5a20e805ff57e853/d52eb4f0e0ca9a5213b8795abbeb11a325d9b22d/95a234f6affbf51f06338383537ab80d637bb785 is able to eliminate this problem. The bugfix is ready for download at git.kernel.org. The best possible mitigation is suggested to be upgrading to the latest version.
In the Linux kernel, the following vulnerability hasbeen resolved:net: ethernet: rtsn:Fix a null pointer dereference in rtsn_probe()Add check for the return value of rcar_gen4_ptp_alloc()to prevent potentialnullpointer dereference.
In the Linux kernel, the following vulnerability hasbeen resolved:net: ethernet: rtsn:Fix a null pointer dereference in rtsn_probe()Add check for the return value of rcar_gen4_ptp_alloc()to prevent potentialnullpointer dereference.
A vulnerability has been found in Linux Kernel up to6.12.38/6.15.6/6.16-rc5 (OperatingSystem) and classified as critical.The CWE definition for the vulnerability is CWE-476. A NULL pointer dereference occurswhenthe application dereferences a pointer that it expects to be valid, but is NULL, typically causing a crash or exit.As an impact it is known to affect availability.Upgrading to version 6.12.39, 6.15.7 or 6.16-rc6 eliminates this vulnerability. Applying the patch 9f260e16b297f8134c5f90bb5a20e805ff57e853/d52eb4f0e0ca9a5213b8795abbeb11a325d9b22d/95a234f6affbf51f06338383537ab80d637bb785 is able to eliminate this problem. The bugfix is ready for download at git.kernel.org. The best possible mitigation is suggested to be upgrading to the latest version.
A vulnerability has been found in Linux Kernel up to6.12.38/6.15.6/6.16-rc5 (OperatingSystem) and classified as critical.The CWE definition for the vulnerability is CWE-476. A NULL pointer dereference occurswhenthe application dereferences a pointer that it expects to be valid, but is NULL, typically causing a crash or exit.As an impact it is known to affect availability.Upgrading to version 6.12.39, 6.15.7 or 6.16-rc6 eliminates this vulnerability. Applying the patch 9f260e16b297f8134c5f90bb5a20e805ff57e853/d52eb4f0e0ca9a5213b8795abbeb11a325d9b22d/95a234f6affbf51f06338383537ab80d637bb785 is able to eliminate this problem. The bugfix is ready for download at git.kernel.org. The best possible mitigation is suggested to be upgrading to the latest version.
In the Linux kernel, the following vulnerability hasbeen resolved:net: ethernet: rtsn:Fix a null pointer dereference in rtsn_probe()Add check for the return value of rcar_gen4_ptp_alloc()to prevent potentialnullpointer dereference.
In the Linux kernel, the following vulnerability hasbeen resolved:net: ethernet: rtsn:Fix a null pointer dereference in rtsn_probe()Add check for the return value of rcar_gen4_ptp_alloc()to prevent potentialnullpointer dereference.
A vulnerability has been found in Linux Kernel up to6.12.38/6.15.6/6.16-rc5 (OperatingSystem) and classified as critical.The CWE definition for the vulnerability is CWE-476. A NULL pointer dereference occurswhenthe application dereferences a pointer that it expects to be valid, but is NULL, typically causing a crash or exit.As an impact it is known to affect availability.Upgrading to version 6.12.39, 6.15.7 or 6.16-rc6 eliminates this vulnerability. Applying the patch 9f260e16b297f8134c5f90bb5a20e805ff57e853/d52eb4f0e0ca9a5213b8795abbeb11a325d9b22d/95a234f6affbf51f06338383537ab80d637bb785 is able to eliminate this problem. The bugfix is ready for download at git.kernel.org. The best possible mitigation is suggested to be upgrading to the latest version.
A vulnerability has been found in Linux Kernel up to6.12.38/6.15.6/6.16-rc5 (OperatingSystem) and classified as critical.The CWE definition for the vulnerability is CWE-476. A NULL pointer dereference occurswhenthe application dereferences a pointer that it expects to be valid, but is NULL, typically causing a crash or exit.As an impact it is known to affect availability.Upgrading to version 6.12.39, 6.15.7 or 6.16-rc6 eliminates this vulnerability. Applying the patch 9f260e16b297f8134c5f90bb5a20e805ff57e853/d52eb4f0e0ca9a5213b8795abbeb11a325d9b22d/95a234f6affbf51f06338383537ab80d637bb785 is able to eliminate this problem. The bugfix is ready for download at git.kernel.org. The best possible mitigation is suggested to be upgrading to the latest version.
In the Linux kernel, the following vulnerability hasbeen resolved:net: ethernet: rtsn:Fix a null pointer dereference in rtsn_probe()Add check for the return value of rcar_gen4_ptp_alloc()to prevent potentialnullpointer dereference.
In the Linux kernel, the following vulnerability hasbeen resolved:net: ethernet: rtsn:Fix a null pointer dereference in rtsn_probe()Add check for the return value of rcar_gen4_ptp_alloc()to prevent potentialnullpointer dereference.
A vulnerability has been found in Linux Kernel up to6.12.38/6.15.6/6.16-rc5 (OperatingSystem) and classified as critical.The CWE definition for the vulnerability is CWE-476. A NULL pointer dereference occurswhenthe application dereferences a pointer that it expects to be valid, but is NULL, typically causing a crash or exit.As an impact it is known to affect availability.Upgrading to version 6.12.39, 6.15.7 or 6.16-rc6 eliminates this vulnerability. Applying the patch 9f260e16b297f8134c5f90bb5a20e805ff57e853/d52eb4f0e0ca9a5213b8795abbeb11a325d9b22d/95a234f6affbf51f06338383537ab80d637bb785 is able to eliminate this problem. The bugfix is ready for download at git.kernel.org. The best possible mitigation is suggested to be upgrading to the latest version.
A vulnerability has been found in Linux Kernel up to6.12.38/6.15.6/6.16-rc5 (OperatingSystem) and classified as critical.The CWE definition for the vulnerability is CWE-476. A NULL pointer dereference occurswhenthe application dereferences a pointer that it expects to be valid, but is NULL, typically causing a crash or exit.As an impact it is known to affect availability.Upgrading to version 6.12.39, 6.15.7 or 6.16-rc6 eliminates this vulnerability. Applying the patch 9f260e16b297f8134c5f90bb5a20e805ff57e853/d52eb4f0e0ca9a5213b8795abbeb11a325d9b22d/95a234f6affbf51f06338383537ab80d637bb785 is able to eliminate this problem. The bugfix is ready for download at git.kernel.org. The best possible mitigation is suggested to be upgrading to the latest version.
In the Linux kernel, the following vulnerability hasbeen resolved:net: ethernet: rtsn:Fix a null pointer dereference in rtsn_probe()Add check for the return value of rcar_gen4_ptp_alloc()to prevent potentialnullpointer dereference.
In the Linux kernel, the following vulnerability hasbeen resolved:net: ethernet: rtsn:Fix a null pointer dereference in rtsn_probe()Add check for the return value of rcar_gen4_ptp_alloc()to prevent potentialnullpointer dereference.
A vulnerability has been found in Linux Kernel up to6.12.38/6.15.6/6.16-rc5 (OperatingSystem) and classified as critical.The CWE definition for the vulnerability is CWE-476. A NULL pointer dereference occurswhenthe application dereferences a pointer that it expects to be valid, but is NULL, typically causing a crash or exit.As an impact it is known to affect availability.Upgrading to version 6.12.39, 6.15.7 or 6.16-rc6 eliminates this vulnerability. Applying the patch 9f260e16b297f8134c5f90bb5a20e805ff57e853/d52eb4f0e0ca9a5213b8795abbeb11a325d9b22d/95a234f6affbf51f06338383537ab80d637bb785 is able to eliminate this problem. The bugfix is ready for download at git.kernel.org. The best possible mitigation is suggested to be upgrading to the latest version.