Back to bug 1992830
| Who | When | What | Removed | Added |
|---|---|---|---|---|
| Guilherme de Almeida Suckevicz | 2021-08-11 19:13:10 UTC | Depends On | 1992832, 1992831 | |
| Guilherme de Almeida Suckevicz | 2021-08-11 19:13:23 UTC | Blocks | 1992833 | |
| Garrett Tucker | 2021-08-11 21:28:48 UTC | Depends On | 1992873, 1992871, 1992872 | |
| Red Hat Bugzilla | 2021-11-14 22:29:35 UTC | CC | fidencio | |
| Guilherme de Almeida Suckevicz | 2022-02-15 18:02:13 UTC | Doc Text | An use-after-free vulnerability was found in usbredir in versions prior to 0.11.0 in usbredirparser_serialize() in usbredirparser/usbredirparser.c when serializing large amounts of buffered write data in case of a slow or blocked destination. | |
| RaTasha Tillery-Smith | 2022-02-15 18:58:19 UTC | Doc Text | An use-after-free vulnerability was found in usbredir in versions prior to 0.11.0 in usbredirparser_serialize() in usbredirparser/usbredirparser.c when serializing large amounts of buffered write data in case of a slow or blocked destination. | A use-after-free vulnerability was found in usbredir in the usbredirparser_serialize() function in usbredirparser/usbredirparser.c . This issue occurs when serializing large amounts of buffered write data in the case of a slow or blocked destination. |
| Red Hat Bugzilla | 2023-07-07 08:28:45 UTC | Assignee | security-response-team | nobody |
Back to bug 1992830