A vulnerability was found in Linux Kernel where in the spk_ttyio_receive_buf2() function, it would dereference spk_ttyio_synth without checking whether it is NULL or not, and may lead to a NULL-ptr deref crash.
References
Link | Resource |
---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=1919900 | Issue Tracking Patch Third Party Advisory |
http://www.openwall.com/lists/oss-security/2020/12/08/1 | Mailing List Third Party Advisory |
http://www.openwall.com/lists/oss-security/2020/12/08/4 | Mailing List Third Party Advisory |
https://www.debian.org/security/2021/dsa-4843 | Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2021/02/msg00018.html | Mailing List Third Party Advisory |
https://security.netapp.com/advisory/ntap-20210625-0004/ | Third Party Advisory |
Information
Published : 2021-05-13 08:15
Updated : 2021-09-07 14:59
NVD link : CVE-2020-27830
Mitre link : CVE-2020-27830
JSON object : View
CWE
CWE-476
NULL Pointer Dereference
Products Affected
debian
- debian_linux
linux
- linux_kernel