[prev in list] [next in list] [prev in thread] [next in thread]
List: oss-security
Subject: Re: [oss-security] Linux Kernel 5.15-rc-ksmbd-part2 is affected by: Buffer Overflow. The impact is:
From: Filip Palian <s3810 () pjwstk ! edu ! pl>
Date: 2022-03-17 12:03:45
Message-ID: CAN10O-ajJuTXLKWWxtg02Nf5yVZ5jLs7B6PY+2F6Hk3PLsCNOg () mail ! gmail ! com
[Download RAW message or body]
https://oss-security.openwall.org/wiki/mailing-lists/oss-security
https://oss-security.openwall.org/wiki/
Thanks for sharing. Wish you happy day as well :]
czw., 17 mar 2022 o 22:45 王明义 <6201613047@stu.jiangnan.edu.cn> napisał(a):
> ** RESERVED ** Linux Kernel 5.15-rc-ksmbd-part2 is affected by: Buffer
> Overflow. The impact is: use-after-free (local). The component is:
> kernel/locking/rwsem.c. The attack vector is: Run OS with Linux Kernel
> 5.15-rc-ksmbd-part2. Then execute the POC file. A vulnerability was
> found in Linux Kernel 5.15-rc-ksmbd-part2 kernel/locking/rwsem.c causing
> use-after-free.
>
>
> It is fixed by
> https://git.kernel.org/pub/scm/linux/kernel/git/netfilter/nf.git/commit/?id=9bf3d2033129
> Please check the following website for details
> https://bugzilla.kernel.org/show_bug.cgi?id=214655
> And I want to request a CVE ID. Looking forward to your reply. Wish you a
> happy day.
[prev in list] [next in list] [prev in thread] [next in thread]
Configure |
About |
News |
Add a list |
Sponsored by KoreLogic