A NULL pointer dereference flaw was found in the Linux kernel’s X.25 set of standardized network protocols functionality in the way a user terminates their session using a simulated Ethernet card and continued usage of this connection. This flaw allows a local user to crash the system.
                
            References
                    | Link | Resource | 
|---|---|
| https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=7781607938c8 | Mailing List Patch Vendor Advisory | 
| http://www.openwall.com/lists/oss-security/2022/06/19/1 | Mailing List | 
| https://lists.debian.org/debian-lts-announce/2022/07/msg00000.html | Mailing List Third Party Advisory | 
| https://www.debian.org/security/2022/dsa-5173 | Third Party Advisory | 
Information
                Published : 2022-05-05 08:15
Updated : 2022-12-08 12:02
NVD link : CVE-2022-1516
Mitre link : CVE-2022-1516
JSON object : View
CWE
                
                    
                        
                        CWE-416
                        
            Use After Free
Products Affected
                debian
- debian_linux
 
linux
- linux_kernel
 


