Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <Y8BednLm17osifo0@gentoo.org>
Date: Thu, 12 Jan 2023 13:24:38 -0600
From: John Helmert III <ajak@...too.org>
To: oss-security@...ts.openwall.com
Subject: Re: CVE-2023-0122: Linux kernel: Pre-Auth Remote DoS
 in NVMe

On Thu, Jan 12, 2023 at 06:10:23PM +0100, Greg KH wrote:
> On Thu, Jan 12, 2023 at 04:12:30PM +0200, Tal Lossos wrote:
> > Hi all,
> > 
> > # Description
> > A NULL Pointer Dereference bug in nvmet_setup_auth
> > (drivers/nvme/target/auth.c) can be triggered remotely to cause a DoS.
> > Since the bug occurs in the authentication feature, it can be easily
> > triggered by an unauthorized client in the pre-auth stage.
> > Versions affected - v6.0-rc1 to v6.0-rc3 (fixed in v6.0-rc4).
> 
> Meta-comment, why are CVE's being assigned for issues found, and then
> fixed, in development kernel releases?  Who assigned this CVE, MITRE or
> someone else?

This information used to be available for "reserved" CVEs in the JSON
data in [1], but now that that's retired I'm not sure this is made
public anywhere.

[1] https://github.com/CVEProject/cvelistV5

> thanks,
> 
> greg k-h

Download attachment "signature.asc" of type "application/pgp-signature" (229 bytes)

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.