Back to bug 1831699
| Who | When | What | Removed | Added |
|---|---|---|---|---|
| Guilherme de Almeida Suckevicz | 2020-05-05 14:03:20 UTC | Blocks | 1831702 | |
| Guilherme de Almeida Suckevicz | 2020-05-05 14:06:27 UTC | Depends On | 1831703 | |
| Rohit Keshri | 2020-05-15 12:21:04 UTC | CC | rkeshri | |
| Rohit Keshri | 2020-05-15 12:31:03 UTC | Depends On | 1836205 | |
| Rohit Keshri | 2020-05-15 12:32:43 UTC | Depends On | 1807052 | |
| Rohit Keshri | 2020-05-15 13:03:04 UTC | Doc Text | There was a memory overflow and data corruption flaw seen in the Mediatek MT76 driver module for wifi in mt76_add_fragment in drivers/net/wireless/mediatek/mt76/dma.c. Were an oversized packet with too many rx fragments causes an overflow and corruption in memory of adjacent pages. A local attacker with special user (or root) privilege can cause a DoS or a leak of internal kernel information. | |
| Rohit Keshri | 2020-05-15 13:04:59 UTC | Comment | 0 | updated |
| Rohit Keshri | 2020-05-18 07:41:09 UTC | Doc Text | There was a memory overflow and data corruption flaw seen in the Mediatek MT76 driver module for wifi in mt76_add_fragment in drivers/net/wireless/mediatek/mt76/dma.c. Were an oversized packet with too many rx fragments causes an overflow and corruption in memory of adjacent pages. A local attacker with special user (or root) privilege can cause a DoS or a leak of internal kernel information. | There was a memory overflow and data corruption flaw seen in the Mediatek MT76 driver module for wifi in mt76_add_fragment in drivers/net/wireless/mediatek/mt76/dma.c. With an oversized packet with too many rx fragments causes an overflow and corruption in memory of adjacent pages. A local attacker with special user (or root) privilege can cause a DoS or a leak of internal kernel information. |
| Rohit Keshri | 2020-05-18 08:05:33 UTC | Comment | 0 | updated |
| Rohit Keshri | 2020-05-18 08:10:04 UTC | Doc Text | There was a memory overflow and data corruption flaw seen in the Mediatek MT76 driver module for wifi in mt76_add_fragment in drivers/net/wireless/mediatek/mt76/dma.c. With an oversized packet with too many rx fragments causes an overflow and corruption in memory of adjacent pages. A local attacker with special user (or root) privilege can cause a DoS or a leak of internal kernel information. | There was a memory overflow and data corruption flaw seen in the Mediatek MT76 driver module for wifi in mt76_add_fragment in drivers/net/wireless/mediatek/mt76/dma.c. In this problem an oversized packet with too many rx fragments causes an overflow and corruption in memory of adjacent pages. A local attacker with special user (or root) privilege can cause a DoS or a leak of internal kernel information. |
| RaTasha Tillery-Smith | 2020-05-19 12:43:51 UTC | Doc Text | There was a memory overflow and data corruption flaw seen in the Mediatek MT76 driver module for wifi in mt76_add_fragment in drivers/net/wireless/mediatek/mt76/dma.c. In this problem an oversized packet with too many rx fragments causes an overflow and corruption in memory of adjacent pages. A local attacker with special user (or root) privilege can cause a DoS or a leak of internal kernel information. | A memory overflow and data corruption flaw were found in the Mediatek MT76 driver module for WiFi in mt76_add_fragment in drivers/net/wireless/mediatek/mt76/dma.c. An oversized packet with too many rx fragments causes an overflow and corruption in memory of adjacent pages. A local attacker with a special user or root privileges can cause a denial of service or a leak of internal kernel information. |
| Jarod Wilson | 2020-06-04 16:59:19 UTC | Depends On | 1844129 | |
| Jarod Wilson | 2020-06-04 17:11:04 UTC | Depends On | 1844129 | |
| Jarod Wilson | 2020-07-24 19:10:18 UTC | Depends On | 1860496 | |
| Jarod Wilson | 2020-07-24 19:11:12 UTC | Depends On | 1860496 | |
| PnT Account Manager | 2020-09-15 20:43:48 UTC | CC | labbott | |
| errata-xmlrpc | 2020-11-04 00:51:03 UTC | Link ID | Red Hat Product Errata RHSA-2020:4431 | |
| Red Hat Bugzilla | 2021-03-23 23:39:50 UTC | CC | matt | |
| Red Hat Bugzilla | 2021-05-30 12:01:37 UTC | CC | blc | |
| Red Hat Bugzilla | 2021-05-30 12:37:13 UTC | CC | bhu | |
| Jeff Fearn 🐞 | 2021-06-03 11:11:47 UTC | CC | blc | |
| Jeff Fearn 🐞 | 2021-06-03 11:58:55 UTC | CC | bhu | |
| Red Hat Bugzilla | 2021-09-15 05:46:51 UTC | CC | jglisse | |
| Red Hat Bugzilla | 2022-04-23 08:28:54 UTC | CC | esammons | |
| Red Hat Bugzilla | 2022-07-16 03:21:12 UTC | CC | brdeoliv | |
| Red Hat Bugzilla | 2022-12-31 23:35:31 UTC | CC | fhrbata | |
| Red Hat Bugzilla | 2023-04-01 08:40:57 UTC | CC | dhoward | |
| Red Hat Bugzilla | 2023-06-14 21:29:43 UTC | CC | mcressma | |
| Red Hat Bugzilla | 2023-07-07 08:34:38 UTC | Assignee | security-response-team | nobody |
Back to bug 1831699