oss-sec mailing list archives
Re: Linux Kernel 5.15-rc-ksmbd-part2 is affected by: Buffer Overflow. The impact is: use-after-free (local).
From: Filip Palian <s3810 () pjwstk edu pl>
Date: Thu, 17 Mar 2022 23:03:45 +1100
https://oss-security.openwall.org/wiki/mailing-lists/oss-security https://oss-security.openwall.org/wiki/ Thanks for sharing. Wish you happy day as well :] czw., 17 mar 2022 o 22:45 王明义 <6201613047 () stu jiangnan edu cn> napisał(a):
** RESERVED ** Linux Kernel 5.15-rc-ksmbd-part2 is affected by: Buffer Overflow. The impact is: use-after-free (local). The component is: kernel/locking/rwsem.c. The attack vector is: Run OS with Linux Kernel 5.15-rc-ksmbd-part2. Then execute the POC file. A vulnerability was found in Linux Kernel 5.15-rc-ksmbd-part2 kernel/locking/rwsem.c causing use-after-free. It is fixed by https://git.kernel.org/pub/scm/linux/kernel/git/netfilter/nf.git/commit/?id=9bf3d2033129 Please check the following website for details https://bugzilla.kernel.org/show_bug.cgi?id=214655 And I want to request a CVE ID. Looking forward to your reply. Wish you a happy day.
Current thread:
- Linux Kernel 5.15-rc-ksmbd-part2 is affected by: Buffer Overflow. The impact is: use-after-free (local). 王明义 (Mar 17)
- Re: Linux Kernel 5.15-rc-ksmbd-part2 is affected by: Buffer Overflow. The impact is: use-after-free (local). Filip Palian (Mar 17)