Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <tencent_51295AD6751A466E1F4D819D@qq.com>
Date: Thu, 17 Mar 2022 10:59:37 +0800
From: "ηŽ‹ζ˜ŽδΉ‰" <6201613047@....jiangnan.edu.cn>
To: "oss-security" <oss-security@...ts.openwall.com>
Subject:  Linux Kernel 5.15-rc-ksmbd-part2 is affected by: Buffer Overflow. The impact is: use-after-free (local). 

** RESERVED ** Linux Kernel 5.15-rc-ksmbd-part2 is affected by: Buffer Overflow. The impact is: use-after-free (local). The component is: kernel/locking/rwsem.c. The attack vector is: Run OS with Linux Kernel 5.15-rc-ksmbd-part2. Then execute the POC file.&nbsp; A vulnerability was found in Linux Kernel 5.15-rc-ksmbd-part2 kernel/locking/rwsem.c causing use-after-free.


It is fixed by&nbsp;https://git.kernel.org/pub/scm/linux/kernel/git/netfilter/nf.git/commit/?id=9bf3d2033129
Please check the following website for details&nbsp;https://bugzilla.kernel.org/show_bug.cgi?id=214655
And I want to request a CVE ID. Looking forward to your reply. Wish you a happy day.

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.