Back to bug 2068236

Who When What Removed Added
Guilherme de Almeida Suckevicz 2022-03-24 17:58:25 UTC Depends On 2068238
Guilherme de Almeida Suckevicz 2022-03-24 17:58:41 UTC Blocks 2068239
Red Hat Bugzilla 2022-06-04 08:04:57 UTC CC fpacheco
Red Hat Bugzilla 2022-07-16 03:21:02 UTC CC brdeoliv
Wade Mealing 2022-08-24 03:26:54 UTC Comment 0 updated
Wade Mealing 2022-08-24 03:34:08 UTC Comment 0 updated
Wade Mealing 2022-08-24 03:35:16 UTC Comment 0 updated
Wade Mealing 2022-08-24 04:47:25 UTC Comment 0 updated
Wade Mealing 2022-08-24 04:55:16 UTC Fixed In Version 3.10-rc1
Wade Mealing 2022-08-24 04:59:38 UTC Doc Text An attacker with the ability to modify the MTU of a virtualized PCIe device (in a guest for example) may crash the host systems kernel if they set the MTU of the VF device to an to an unsupported value.
RaTasha Tillery-Smith 2022-08-24 12:14:11 UTC Doc Text An attacker with the ability to modify the MTU of a virtualized PCIe device (in a guest for example) may crash the host systems kernel if they set the MTU of the VF device to an to an unsupported value. A flaw was found in the Linux kernel. This flaw allows an attacker who can modify the MTU of a virtualized PCIe device (in a guest, for example) to crash the host system’s kernel if they set the MTU of the VF device to an unsupported value.
Red Hat Bugzilla 2022-12-31 23:36:36 UTC CC fhrbata
Red Hat Bugzilla 2023-04-01 08:42:27 UTC CC dhoward
Red Hat Bugzilla 2023-07-07 08:31:23 UTC Assignee security-response-team nobody

Back to bug 2068236