Back to bug 2129419
| Who | When | What | Removed | Added |
|---|---|---|---|---|
| Guilherme de Almeida Suckevicz | 2022-09-23 17:09:38 UTC | Depends On | 2129420 | |
| Guilherme de Almeida Suckevicz | 2022-09-23 17:09:46 UTC | Blocks | 2129421 | |
| Rohit Keshri | 2022-10-02 18:48:34 UTC | CC | bdettelb | |
| Fixed In Version | kernel 5.19 rc8 | |||
| Rohit Keshri | 2022-10-02 19:02:16 UTC | Depends On | 2131598, 2131595, 2131597, 2131596 | |
| Rohit Keshri | 2022-10-02 19:10:27 UTC | Doc Text | An out-of-bounds (OOB) memory read problem was found in bpf in the Linux kernel in kernel/bpf/syscall.c, due to an improper check of bpf_sys_bpf() arguments. Bounds check failure allows a local attacker to gain access to out-of-bounds memory leading to a leak of internal kernel information. | |
| RaTasha Tillery-Smith | 2022-10-03 13:37:04 UTC | Doc Text | An out-of-bounds (OOB) memory read problem was found in bpf in the Linux kernel in kernel/bpf/syscall.c, due to an improper check of bpf_sys_bpf() arguments. Bounds check failure allows a local attacker to gain access to out-of-bounds memory leading to a leak of internal kernel information. | An out-of-bounds (OOB) memory read problem was found in bpf in the Linux kernel's kernel/bpf/syscall.c function due to an improper check of bpf_sys_bpf() arguments. The bounds check failure allows a local attacker to access out-of-bounds memory, leading to a leak of internal kernel information. |
| Red Hat Bugzilla | 2022-12-31 23:36:33 UTC | CC | fhrbata | |
| Red Hat Bugzilla | 2023-04-01 08:42:23 UTC | CC | dhoward | |
| Red Hat Bugzilla | 2023-07-07 08:29:17 UTC | Assignee | security-response-team | nobody |
Back to bug 2129419