|
Message-ID: <YlQSAy7P8xHKaWpT@kroah.com> Date: Mon, 11 Apr 2022 13:33:23 +0200 From: Greg KH <greg@...ah.com> To: oss-security@...ts.openwall.com Subject: Re: CVE-2022-28893: Linux kernel: Use after free in SUNRPC subsystem On Mon, Apr 11, 2022 at 04:20:56PM +0800, Felix Fu wrote: > Hello, I Request a CVE from MITRE. > > Description: The SUNRPC subsystem in the Linux kernel through 5.17.2 can > call xs_xprt_free before ensuring that sockets are in the intended state. > Details: Use after free happens in inet_put_port because some sockets are > not close before xs_xprt_free(). > CVE-ID: CVE-2022-28893 ( > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28893) > Fix: > https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=1a3b1bba7c7a5eb8a11513cf88427cb9d77bc60a This is a merge commit, not the actual commit that fixed the issue :( thanks, greg k-h
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.