Back to bug 2129419

Who When What Removed Added
Guilherme de Almeida Suckevicz 2022-09-23 17:09:38 UTC Depends On 2129420
Guilherme de Almeida Suckevicz 2022-09-23 17:09:46 UTC Blocks 2129421
Rohit Keshri 2022-10-02 18:48:34 UTC CC bdettelb
Fixed In Version kernel 5.19 rc8
Rohit Keshri 2022-10-02 19:02:16 UTC Depends On 2131598, 2131595, 2131597, 2131596
Rohit Keshri 2022-10-02 19:10:27 UTC Doc Text An out-of-bounds (OOB) memory read problem was found in bpf in the Linux kernel in kernel/bpf/syscall.c, due to an improper check of bpf_sys_bpf() arguments. Bounds check failure allows a local attacker to gain access to out-of-bounds memory leading to a leak of internal kernel information.
RaTasha Tillery-Smith 2022-10-03 13:37:04 UTC Doc Text An out-of-bounds (OOB) memory read problem was found in bpf in the Linux kernel in kernel/bpf/syscall.c, due to an improper check of bpf_sys_bpf() arguments. Bounds check failure allows a local attacker to gain access to out-of-bounds memory leading to a leak of internal kernel information. An out-of-bounds (OOB) memory read problem was found in bpf in the Linux kernel's kernel/bpf/syscall.c function due to an improper check of bpf_sys_bpf() arguments. The bounds check failure allows a local attacker to access out-of-bounds memory, leading to a leak of internal kernel information.
Red Hat Bugzilla 2022-12-31 23:36:33 UTC CC fhrbata
Red Hat Bugzilla 2023-04-01 08:42:23 UTC CC dhoward
Red Hat Bugzilla 2023-07-07 08:29:17 UTC Assignee security-response-team nobody

Back to bug 2129419