Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2020-27830

Опубликовано: 13 мая 2021
Источник: debian
EPSS Низкий

Описание

A vulnerability was found in Linux Kernel where in the spk_ttyio_receive_buf2() function, it would dereference spk_ttyio_synth without checking whether it is NULL or not, and may lead to a NULL-ptr deref crash.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
linuxfixed5.9.15-1package
linuxnot-affectedstretchpackage

Примечания

  • https://www.openwall.com/lists/oss-security/2020/12/07/1

  • https://git.kernel.org/linus/f0992098cadb4c9c6a00703b66cafe604e178fea

EPSS

Процентиль: 35%
0.00146
Низкий

Связанные уязвимости

CVSS3: 5.5
ubuntu
больше 4 лет назад

A vulnerability was found in Linux Kernel where in the spk_ttyio_receive_buf2() function, it would dereference spk_ttyio_synth without checking whether it is NULL or not, and may lead to a NULL-ptr deref crash.

CVSS3: 5.5
redhat
около 5 лет назад

A vulnerability was found in Linux Kernel where in the spk_ttyio_receive_buf2() function, it would dereference spk_ttyio_synth without checking whether it is NULL or not, and may lead to a NULL-ptr deref crash.

CVSS3: 5.5
nvd
больше 4 лет назад

A vulnerability was found in Linux Kernel where in the spk_ttyio_receive_buf2() function, it would dereference spk_ttyio_synth without checking whether it is NULL or not, and may lead to a NULL-ptr deref crash.

github
больше 3 лет назад

A vulnerability was found in Linux Kernel where in the spk_ttyio_receive_buf2() function, it would dereference spk_ttyio_synth without checking whether it is NULL or not, and may lead to a NULL-ptr deref crash.

CVSS3: 5.5
fstec
около 5 лет назад

Уязвимость функции spk_ttyio_receive_buf2() ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании

EPSS

Процентиль: 35%
0.00146
Низкий