|
Message-Id: <76041A8A-5899-4BC6-AEDE-58C591807AFB@oracle.com>
Date: Mon, 7 Dec 2020 10:23:45 +0000
From: John Haxby <john.haxby@...cle.com>
To: oss-security@...ts.openwall.com
Cc: nopitydays@...il.com
Subject: Re: Linux kernel NULL-ptr deref bug in
spk_ttyio_receive_buf2
> On 7 Dec 2020, at 02:20, Shisong Qin <qinshisong1205@...il.com> wrote:
>
> Recently we found another NULL-ptr deref BUG in spk_ttyio.c in the latest
> Linux kernel(5.9.11 is the latest at that now). In the
> spk_ttyio_receive_buf2() function, it would dereference spk_ttyio_synth
> without checking whether it is NULL or not, and may lead to a NULL-ptr
> deref crash.
Did you ask for a CVE for bug?
jch
Download attachment "signature.asc" of type "application/pgp-signature" (269 bytes)
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.