Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <Y8A+/ys+5oIRzr9V@kroah.com>
Date: Thu, 12 Jan 2023 18:10:23 +0100
From: Greg KH <greg@...ah.com>
To: oss-security@...ts.openwall.com
Subject: Re: CVE-2023-0122: Linux kernel: Pre-Auth Remote DoS
 in NVMe

On Thu, Jan 12, 2023 at 04:12:30PM +0200, Tal Lossos wrote:
> Hi all,
> 
> # Description
> A NULL Pointer Dereference bug in nvmet_setup_auth
> (drivers/nvme/target/auth.c) can be triggered remotely to cause a DoS.
> Since the bug occurs in the authentication feature, it can be easily
> triggered by an unauthorized client in the pre-auth stage.
> Versions affected - v6.0-rc1 to v6.0-rc3 (fixed in v6.0-rc4).

Meta-comment, why are CVE's being assigned for issues found, and then
fixed, in development kernel releases?  Who assigned this CVE, MITRE or
someone else?

thanks,

greg k-h

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.