Back to bug 2068236
| Who | When | What | Removed | Added |
|---|---|---|---|---|
| Guilherme de Almeida Suckevicz | 2022-03-24 17:58:25 UTC | Depends On | 2068238 | |
| Guilherme de Almeida Suckevicz | 2022-03-24 17:58:41 UTC | Blocks | 2068239 | |
| Red Hat Bugzilla | 2022-06-04 08:04:57 UTC | CC | fpacheco | |
| Red Hat Bugzilla | 2022-07-16 03:21:02 UTC | CC | brdeoliv | |
| Wade Mealing | 2022-08-24 03:26:54 UTC | Comment | 0 | updated |
| Wade Mealing | 2022-08-24 03:34:08 UTC | Comment | 0 | updated |
| Wade Mealing | 2022-08-24 03:35:16 UTC | Comment | 0 | updated |
| Wade Mealing | 2022-08-24 04:47:25 UTC | Comment | 0 | updated |
| Wade Mealing | 2022-08-24 04:55:16 UTC | Fixed In Version | 3.10-rc1 | |
| Wade Mealing | 2022-08-24 04:59:38 UTC | Doc Text | An attacker with the ability to modify the MTU of a virtualized PCIe device (in a guest for example) may crash the host systems kernel if they set the MTU of the VF device to an to an unsupported value. | |
| RaTasha Tillery-Smith | 2022-08-24 12:14:11 UTC | Doc Text | An attacker with the ability to modify the MTU of a virtualized PCIe device (in a guest for example) may crash the host systems kernel if they set the MTU of the VF device to an to an unsupported value. | A flaw was found in the Linux kernel. This flaw allows an attacker who can modify the MTU of a virtualized PCIe device (in a guest, for example) to crash the host system’s kernel if they set the MTU of the VF device to an unsupported value. |
| Red Hat Bugzilla | 2022-12-31 23:36:36 UTC | CC | fhrbata | |
| Red Hat Bugzilla | 2023-04-01 08:42:27 UTC | CC | dhoward | |
| Red Hat Bugzilla | 2023-07-07 08:31:23 UTC | Assignee | security-response-team | nobody |
Back to bug 2068236