A vulnerability was found in Linux Kernel where in the spk_ttyio_receive_buf2() function, it would dereference spk_ttyio_synth without checking whether it is NULL or not, and may lead to a NULL-ptr deref crash.
The product dereferences a pointer that it expects to be valid but is NULL.
Link | Tags |
---|---|
http://www.openwall.com/lists/oss-security/2020/12/08/1 | third party advisory mailing list |
http://www.openwall.com/lists/oss-security/2020/12/08/4 | third party advisory mailing list |
https://www.debian.org/security/2021/dsa-4843 | third party advisory vendor advisory |
https://lists.debian.org/debian-lts-announce/2021/02/msg00018.html | third party advisory mailing list |
https://bugzilla.redhat.com/show_bug.cgi?id=1919900 | issue tracking third party advisory patch |
https://security.netapp.com/advisory/ntap-20210625-0004/ | third party advisory |