Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Thu, 17 Mar 2022 23:03:45 +1100
From: Filip Palian <s3810@...stk.edu.pl>
To: oss-security@...ts.openwall.com
Subject: Re: Linux Kernel 5.15-rc-ksmbd-part2 is affected by:
 Buffer Overflow. The impact is: use-after-free (local).

https://oss-security.openwall.org/wiki/mailing-lists/oss-security
https://oss-security.openwall.org/wiki/

Thanks for sharing. Wish you happy day as well :]


czw., 17 mar 2022 o 22:45 王明义 <6201613047@....jiangnan.edu.cn> napisał(a):

> ** RESERVED ** Linux Kernel 5.15-rc-ksmbd-part2 is affected by: Buffer
> Overflow. The impact is: use-after-free (local). The component is:
> kernel/locking/rwsem.c. The attack vector is: Run OS with Linux Kernel
> 5.15-rc-ksmbd-part2. Then execute the POC file.&nbsp; A vulnerability was
> found in Linux Kernel 5.15-rc-ksmbd-part2 kernel/locking/rwsem.c causing
> use-after-free.
>
>
> It is fixed by&nbsp;
> https://git.kernel.org/pub/scm/linux/kernel/git/netfilter/nf.git/commit/?id=9bf3d2033129
> Please check the following website for details&nbsp;
> https://bugzilla.kernel.org/show_bug.cgi?id=214655
> And I want to request a CVE ID. Looking forward to your reply. Wish you a
> happy day.

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.