vulnerability bulletin 30895 OpenBSD: NULL pointer dereference via net80211 Synthesis of the vulnerability An attacker can force a NULL pointer to be dereferenced via net80211 of OpenBSD, in order to trigger a denial of service.Severity of this announce: 1/4. Creation date: 18/11/2019. Références of this computer vulnerability: VIGILANCE-VUL-30895. Full Vigil@nce bulletin... (Free trial) Description of the vulnerability An attacker can force a NULL pointer to be dereferenced via net80211 of OpenBSD, in order to trigger a denial of service.Full Vigil@nce bulletin... (Free trial)This security note impacts software or systems such as OpenBSD. Our Vigil@nce team determined that the severity of this threat announce is low. The trust level is of type confirmed by the editor, with an origin of user shell. An attacker with a expert ability can exploit this computer weakness announce. Solutions for this threat OpenBSD: patch for net80211. A patch is available: https://ftp.openbsd.org/pub/OpenBSD/patches/6.5/common/015_net80211.patch.sig https://ftp.openbsd.org/pub/OpenBSD/patches/6.6/common/004_net80211.patch.sig Full Vigil@nce bulletin... (Free trial) Computer vulnerabilities tracking service Vigil@nce provides cybersecurity alerts. The Vigil@nce vulnerability database contains several thousand vulnerabilities. The Vigil@nce security watch publishes vulnerability bulletins about threats impacting the information system. The technology watch team tracks security threats targeting the computer system.