A NULL pointer dereference vulnerability was found in netlink_dump. This issue can occur when the Netlink socket receives the message(sendmsg) for the XFRM_MSG_GETSA, XFRM_MSG_GETPOLICY type message, and the DUMP flag is set and can cause a denial of service or possibly another unspecified impact. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although it is unlikely.
A NULL pointer dereference occurs when the application dereferences a pointer that it expects to be valid, but is NULL, typically causing a crash or exit.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Linux_kernel | Linux | 3.15 (including) | 3.16.39 (excluding) |
Linux_kernel | Linux | 3.17 (including) | 4.4.223 (excluding) |
Linux_kernel | Linux | 4.5 (including) | 4.7.10 (excluding) |
Linux_kernel | Linux | 4.8-rc1 (including) | 4.8-rc1 (including) |
Linux_kernel | Linux | 4.8-rc2 (including) | 4.8-rc2 (including) |
Linux_kernel | Linux | 4.8-rc3 (including) | 4.8-rc3 (including) |
Linux_kernel | Linux | 4.8-rc4 (including) | 4.8-rc4 (including) |
Linux_kernel | Linux | 4.8-rc5 (including) | 4.8-rc5 (including) |
Linux_kernel | Linux | 4.8-rc6 (including) | 4.8-rc6 (including) |