Linux kernel, the kernel used by the Linux Foundation’s open source operating system Linux, is vulnerable to a denial-of-service attack in versions of Linux kernel prior to 6.1.6. In affected versions of the Linux kernel, a NULL pointer dereference error in the flow control subsystem allows an unprivileged user to trigger a denial of service (system crash) via a carefully crafted flow control configuration set using the “tc qdisc” and “tc class” commands. Trigger a denial of service (system crash). This affects the qdisc_graft in net/ schedule /sch_api.c. An attacker could use this vulnerability to launch a targeted attack against the target, compromising the site’s system security.