Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Thu, 18 Mar 2021 17:03:53 +0530
From: Rohit Keshri <>
Subject: Re: CVE-2021-20219 Linux kernel: improper synchronization in
 flush_to_ldisc() can lead to DoS

Hello Team,

> Given that the above CVE is not public in any database that I can find,
> one can only hope that the text will reflect what really is happening
> here.  Rohit, why was this even published?

> Again, stuff like this is just causing extra work by everyone else for
> no good reason that I can see.

I understand and apologize for the confusion.

This issue was reported for rhel7 to us (which was not seen in rhel8
or later versions),  but it also  applies to  kernel before this
('3d63b7e4ae0dc') patch or kernel without this patch.

$ git tag --contains  3d63b7e4ae0dc


Since this issue was reported to us,  identified as a security flaw,
and was fixed in the upstream, we decided to assign a CVE.

We appreciate and value your feedback and co-operation.

Rohit Keshri / Red Hat Product Security Team
PGP: OX01BC 858A 07B7 15C8 EF33 BFE2 2EEB 0CBC 84A4 4C2D for urgent response

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.