Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20211026123018.GA30888@openwall.com>
Date: Tue, 26 Oct 2021 14:30:18 +0200
From: Solar Designer <solar@...nwall.com>
To: Lin Horse <kylin.formalin@...il.com>
Cc: oss-security@...ts.openwall.com
Subject: Re: CVE-2021-3760: Linux kernel: Use-After-Free vulnerability of ndev->rf_conn_info object

On Tue, Oct 26, 2021 at 08:14:20PM +0800, Lin Horse wrote:
> The commit for the fix is 1b1499a817c90fd1ce9453a2c98d2a01cca0e775 (link:
> https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=1b1499a817c90fd1ce9453a2c98d2a01cca0e775
> )

Thanks.  Looks like the same fix you already shared on September 1.

I also found this was (first?) made public on Linux kernel mailing lists
(linux-nfc, netdev, linux-kernel) on October 7 by someone from Canonical
(and Lin was CC'ed):

https://lists.openwall.net/netdev/2021/10/07/239

Canonical didn't break the embargo there because it was supposed to be
already over by then, however I think it was their opportunity to remind
about the need to make the oss-security posting, or to make the posting
themselves.  Speaking of which, I think SUSE (as they first reminded) or
Gentoo or Amazon (as they're tasked with this) could and should have
brought this to oss-security shortly after Lin didn't reply to the
September 17 reminder.  To send a reminder and forget for another month
isn't a reliable approach.

Alexander

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.