SB20240531483 - NULL pointer dereference in Linux kernel tipc
Published: May 31, 2024 Updated: May 14, 2025
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) NULL pointer dereference (CVE-ID: CVE-2021-47186)
The vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the tipc_aead_init() function in net/tipc/crypto.c. A local user can perform a denial of service (DoS) attack.
Remediation
Install update from vendor's website.
References
- https://git.kernel.org/stable/c/a7d91625863d4ffed63b993b5e6dc1298b6430c9
- https://git.kernel.org/stable/c/9404c4145542c23019a80ab1bb2ecf73cd057b10
- https://git.kernel.org/stable/c/3e6db079751afd527bf3db32314ae938dc571916
- https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.10.82
- https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.5
- https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.16