First published: Thu May 05 2022(Updated: )
A NULL pointer dereference flaw was found in the Linux kernel’s X.25 set of standardized network protocols functionality in the way a user terminates their session using a simulated Ethernet card and continued usage of this connection. This flaw allows a local user to crash the system.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | =5.18-rc1 | |
Debian Linux | =9.0 | |
Debian Linux | =10.0 | |
debian/linux | 5.10.223-1 5.10.234-1 6.1.129-1 6.1.135-1 6.12.22-1 6.12.25-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-1516 has a severity rating that indicates it can allow a local user to crash the system through a NULL pointer dereference.
To fix CVE-2022-1516, update the Linux kernel to the patched versions listed in the vulnerability report.
CVE-2022-1516 affects various versions of the Linux kernel, particularly those that implement X.25 networking protocols.
Systems running specific versions of the Linux kernel and its derivatives, such as Debian, are vulnerable to CVE-2022-1516.
CVE-2022-1516 is a local vulnerability that can be exploited by logged-in users on the affected system.