Back to bug 1553775

Who When What Removed Added
Karen Noel 2018-03-09 14:17:29 UTC Assignee virt-maint pbonzini
Paolo Bonzini 2018-03-09 14:18:17 UTC Status NEW POST
Karen Noel 2018-03-10 12:57:10 UTC CC mtessun
Flags needinfo?(juzhang) needinfo?(mtessun)
Miya Chen 2018-03-12 02:08:58 UTC Flags needinfo?(juzhang)
Karen Noel 2018-03-12 02:37:28 UTC Flags needinfo?(mtessun) needinfo?(salmy)
Qunfang Zhang 2018-03-12 03:00:54 UTC QA Contact virt-bugs qzhang
Martin Tessun 2018-03-13 09:25:34 UTC Priority unspecified high
Severity unspecified high
Steve Almy 2018-03-13 12:48:29 UTC Flags needinfo?(salmy)
Oneata Mircea Teodor 2018-03-13 15:18:02 UTC Blocks 1554930
Oneata Mircea Teodor 2018-03-13 15:18:32 UTC Keywords ZStream
Jiri Herrmann 2018-04-05 13:33:10 UTC CC jherrman
Doc Text Previously, system calls to the address_space_to_flatview function in some cases targeted functions that were not sufficiently synchronized by the read-copy-update (RCU) mechanism. This was a potential security risk. The affected system calls have been fixed, and they can no longer be used as a vector for malicious code.
Doc Type If docs needed, set a value Bug Fix
Miroslav Rezanina 2018-04-27 10:44:25 UTC Status POST MODIFIED
CC mrezanin
Fixed In Version qemu-kvm-ma-2.12.0-1.el7
auto-bz-updater 2018-04-27 10:46:52 UTC Status MODIFIED ON_QA
xianwang 2018-08-27 10:38:34 UTC Status ON_QA VERIFIED
CC xianwang
errata-xmlrpc 2018-10-30 00:13:59 UTC Status VERIFIED RELEASE_PENDING
errata-xmlrpc 2018-10-30 08:03:30 UTC Status RELEASE_PENDING CLOSED
Resolution --- ERRATA
Last Closed 2018-10-30 04:03:30 UTC
errata-xmlrpc 2018-10-30 08:06:00 UTC Link ID Red Hat Product Errata RHSA-2018:3062

Back to bug 1553775