Back to bug 1928236

Who When What Removed Added
Guilherme de Almeida Suckevicz 2021-02-12 17:16:15 UTC CC security-response-team
Guilherme de Almeida Suckevicz 2021-02-12 17:17:38 UTC Blocks 1906597
Guilherme de Almeida Suckevicz 2021-02-12 17:19:24 UTC Summary EMBARGOED kernel: broken KRETPROBES reports corruption of .text section while running a FTRACE stress tester EMBARGOED CVE-2021-3411 kernel: broken KRETPROBES reports corruption of .text section while running a FTRACE stress tester
Alias CVE-2021-3411
Guilherme de Almeida Suckevicz 2021-02-12 17:20:25 UTC Blocks 1928240
Rohit Keshri 2021-02-13 06:03:58 UTC CC esammons, iboverma, jross, mcressma
Rohit Keshri 2021-02-14 09:35:10 UTC CC rkeshri
Rohit Keshri 2021-02-14 09:54:59 UTC Depends On 1928462
Rohit Keshri 2021-02-14 09:55:33 UTC Depends On 1928463
Rohit Keshri 2021-02-14 09:56:25 UTC Depends On 1928464
Rohit Keshri 2021-02-14 09:56:33 UTC Depends On 1928465
Rohit Keshri 2021-02-14 09:56:43 UTC Depends On 1928466
Rohit Keshri 2021-02-14 09:58:39 UTC Depends On 1928467
Rohit Keshri 2021-02-15 04:45:28 UTC Doc Text A violation of memory access flaw was found while detecting a padding of int3 in the linking state in function can_optimize in arch/x86/kernel/kprobes/opt.c. In this problem a local attacker with a special user privilege may cause a threat to a system Integrity and Confidentiality, and may even lead to a denial of service problem.
Rohit Keshri 2021-02-15 04:54:42 UTC Comment 0 updated
Rohit Keshri 2021-02-19 12:18:24 UTC Group security, qe_staff
CC adscvr, airlied, alciregi, bskeggs, hdegoede, jarodwilson, jeremy, jforbes, jglisse, jonathan, josef, jwboyer, kernel-maint, kernel-mgr, linville, masami256, mchehab, rt-maint, steved
Deadline 2020-12-09
Summary EMBARGOED CVE-2021-3411 kernel: broken KRETPROBES reports corruption of .text section while running a FTRACE stress tester CVE-2021-3411 kernel: broken KRETPROBES reports corruption of .text section while running a FTRACE stress tester
Eric Christensen 2021-02-19 14:50:29 UTC Doc Text A violation of memory access flaw was found while detecting a padding of int3 in the linking state in function can_optimize in arch/x86/kernel/kprobes/opt.c. In this problem a local attacker with a special user privilege may cause a threat to a system Integrity and Confidentiality, and may even lead to a denial of service problem. A flaw was found in the Linux kernel. A violation of memory access was found while detecting a padding of int3 in the linking state. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
Pedro Sampaio 2021-03-08 18:48:49 UTC Flags needinfo?(rkeshri)
Pedro Sampaio 2021-03-08 18:50:41 UTC CC psampaio
Guilherme de Almeida Suckevicz 2021-03-09 13:33:10 UTC Fixed In Version Linux kernel 5.10
Flags needinfo?(rkeshri)
Steve Grubb 2021-03-22 19:00:59 UTC CC sgrubb
Jerome Marchand 2021-03-26 16:27:19 UTC CC jmarchan
Red Hat Bugzilla 2021-05-30 12:03:45 UTC CC blc
Red Hat Bugzilla 2021-05-30 12:47:30 UTC CC bhu
Jeff Fearn 🐞 2021-06-03 11:14:50 UTC CC blc
Jeff Fearn 🐞 2021-06-03 12:06:54 UTC CC bhu
Red Hat Bugzilla 2021-09-15 05:46:44 UTC CC jglisse
Red Hat Bugzilla 2022-04-23 08:28:58 UTC CC esammons
Red Hat Bugzilla 2022-07-16 03:21:01 UTC CC brdeoliv
Red Hat Bugzilla 2022-12-31 23:35:18 UTC CC fhrbata
Red Hat Bugzilla 2023-04-01 08:40:41 UTC CC dhoward
Red Hat Bugzilla 2023-06-14 21:29:48 UTC CC mcressma
Red Hat Bugzilla 2023-07-07 08:32:21 UTC Assignee security-response-team nobody
CC security-response-team

Back to bug 1928236