|
Message-ID: <CAKx+4-pR3JScgA-PJFSwkAw6B8xiXYWFtVD6rEYp2wnJjyCogw@mail.gmail.com> Date: Thu, 18 Mar 2021 17:03:53 +0530 From: Rohit Keshri <rkeshri@...hat.com> To: oss-security@...ts.openwall.com Subject: Re: CVE-2021-20219 Linux kernel: improper synchronization in flush_to_ldisc() can lead to DoS Hello Team, > Given that the above CVE is not public in any database that I can find, > one can only hope that the text will reflect what really is happening > here. Rohit, why was this even published? > Again, stuff like this is just causing extra work by everyone else for > no good reason that I can see. I understand and apologize for the confusion. This issue was reported for rhel7 to us (which was not seen in rhel8 or later versions), but it also applies to kernel before this ('3d63b7e4ae0dc') patch or kernel without this patch. $ git tag --contains 3d63b7e4ae0dc v4.18 v4.18-rc3 v4.18-rc4 v4.18-rc5 v4.18-rc6 v4.18-rc7 v4.18-rc8 .. Since this issue was reported to us, identified as a security flaw, and was fixed in the upstream, we decided to assign a CVE. We appreciate and value your feedback and co-operation. .. Rohit Keshri / Red Hat Product Security Team PGP: OX01BC 858A 07B7 15C8 EF33 BFE2 2EEB 0CBC 84A4 4C2D secalert@...hat.com for urgent response
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.