SB2024082181 - NULL pointer dereference in Linux kernel accessibility speakup driver
Published: August 21, 2024 Updated: May 12, 2025
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) NULL pointer dereference (CVE-ID: CVE-2022-48870)
The vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the spk_ttyio_release() function in drivers/accessibility/speakup/spk_ttyio.c. A local user can perform a denial of service (DoS) attack.
Remediation
Install update from vendor's website.
References
- https://git.kernel.org/stable/c/2da67bff29ab49caafb0766e8b8383b735ff796f
- https://git.kernel.org/stable/c/64152e05a4de3ebf59f1740a0985a6d5fba0c77b
- https://git.kernel.org/stable/c/5abbeebd8296c2301023b8dc4b5a6c0d5229b4f5
- https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.90
- https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.1.8
- https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.2