|
Message-ID: <tencent_51295AD6751A466E1F4D819D@qq.com> Date: Thu, 17 Mar 2022 10:59:37 +0800 From: "ηζδΉ" <6201613047@....jiangnan.edu.cn> To: "oss-security" <oss-security@...ts.openwall.com> Subject: Linux Kernel 5.15-rc-ksmbd-part2 is affected by: Buffer Overflow. The impact is: use-after-free (local). ** RESERVED ** Linux Kernel 5.15-rc-ksmbd-part2 is affected by: Buffer Overflow. The impact is: use-after-free (local). The component is: kernel/locking/rwsem.c. The attack vector is: Run OS with Linux Kernel 5.15-rc-ksmbd-part2. Then execute the POC file. A vulnerability was found in Linux Kernel 5.15-rc-ksmbd-part2 kernel/locking/rwsem.c causing use-after-free. It is fixed by https://git.kernel.org/pub/scm/linux/kernel/git/netfilter/nf.git/commit/?id=9bf3d2033129 Please check the following website for details https://bugzilla.kernel.org/show_bug.cgi?id=214655 And I want to request a CVE ID. Looking forward to your reply. Wish you a happy day.
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.