[prev in list] [next in list] [prev in thread] [next in thread] 

List:       oss-security
Subject:    Re: [oss-security] Linux Kernel 5.15-rc-ksmbd-part2 is affected by: Buffer Overflow. The impact is: 
From:       Filip Palian <s3810 () pjwstk ! edu ! pl>
Date:       2022-03-17 12:03:45
Message-ID: CAN10O-ajJuTXLKWWxtg02Nf5yVZ5jLs7B6PY+2F6Hk3PLsCNOg () mail ! gmail ! com
[Download RAW message or body]


https://oss-security.openwall.org/wiki/mailing-lists/oss-security
https://oss-security.openwall.org/wiki/

Thanks for sharing. Wish you happy day as well :]


czw., 17 mar 2022 o 22:45 王明义 <6201613047@stu.jiangnan.edu.cn> napisał(a):

> ** RESERVED ** Linux Kernel 5.15-rc-ksmbd-part2 is affected by: Buffer
> Overflow. The impact is: use-after-free (local). The component is:
> kernel/locking/rwsem.c. The attack vector is: Run OS with Linux Kernel
> 5.15-rc-ksmbd-part2. Then execute the POC file.&nbsp; A vulnerability was
> found in Linux Kernel 5.15-rc-ksmbd-part2 kernel/locking/rwsem.c causing
> use-after-free.
>
>
> It is fixed by&nbsp;
> https://git.kernel.org/pub/scm/linux/kernel/git/netfilter/nf.git/commit/?id=9bf3d2033129
> Please check the following website for details&nbsp;
> https://bugzilla.kernel.org/show_bug.cgi?id=214655
> And I want to request a CVE ID. Looking forward to your reply. Wish you a
> happy day.


[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic