CVE-2020-27830 - log back

CVE-2020-27830 edited at 12 Dec 2020 22:56:01
Description
- A security issue was found in the speakup module of the Linux kernel. In the spk_ttyio_receive_buf2() function in drivers/accessibility/speakup/spk_ttyio.c, it would dereference spk_ttyio_synth without checking whether it is NULL or not, and may lead to a null pointer dereference crash.
+ A security issue was found in the speakup module of the Linux kernel through 5.9.13. In the spk_ttyio_receive_buf2() function in drivers/accessibility/speakup/spk_ttyio.c, it would dereference spk_ttyio_synth without checking whether it is NULL or not, and may lead to a null pointer dereference crash.
CVE-2020-27830 edited at 12 Dec 2020 22:54:06
References
https://www.openwall.com/lists/oss-security/2020/12/07/1
https://www.openwall.com/lists/oss-security/2020/12/08/1
- https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=f0992098cadb4c9c6a00703b66cafe604e178fea
+ https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=9920472eaa7c652c7abcad4911fa83b6ae5a4955
CVE-2020-27830 edited at 12 Dec 2020 22:47:45
References
https://www.openwall.com/lists/oss-security/2020/12/07/1
https://www.openwall.com/lists/oss-security/2020/12/08/1
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f0992098cadb4c9c6a00703b66cafe604e178fea
+ https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=f0992098cadb4c9c6a00703b66cafe604e178fea
CVE-2020-27830 edited at 08 Dec 2020 08:59:42
References
https://www.openwall.com/lists/oss-security/2020/12/07/1
https://www.openwall.com/lists/oss-security/2020/12/08/1
+ https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f0992098cadb4c9c6a00703b66cafe604e178fea
Notes
In Arch Linux, the affected part of the Linux kernel is built as a module which is not loaded by default. If accessibility support is not needed, the vulnerability can be mitigated by blacklisting the affected module:
- echo 'blacklist speakup' > /etc/modprobe.d/CVE-2020-27830.conf
+ # echo 'blacklist speakup' > /etc/modprobe.d/CVE-2020-27830.conf
CVE-2020-27830 edited at 08 Dec 2020 08:50:52
Severity
- Unknown
+ Medium
Remote
- Unknown
+ Local
Type
- Unknown
+ Denial of service
Description
+ A security issue was found in the speakup module of the Linux kernel. In the spk_ttyio_receive_buf2() function in drivers/accessibility/speakup/spk_ttyio.c, it would dereference spk_ttyio_synth without checking whether it is NULL or not, and may lead to a null pointer dereference crash.
References
+ https://www.openwall.com/lists/oss-security/2020/12/07/1
+ https://www.openwall.com/lists/oss-security/2020/12/08/1
Notes
+ In Arch Linux, the affected part of the Linux kernel is built as a module which is not loaded by default. If accessibility support is not needed, the vulnerability can be mitigated by blacklisting the affected module:
+
+ echo 'blacklist speakup' > /etc/modprobe.d/CVE-2020-27830.conf
CVE-2020-27830 created at 08 Dec 2020 08:34:05