Back to bug 2165706

Who When What Removed Added
Rohit Keshri 2023-01-30 19:59:01 UTC Fixed In Version Kernel 6.2 RC1
Rohit Keshri 2023-01-30 20:00:57 UTC CC acaringi, bhu, chwhite, ddepaula, debarbos, dfreiber, dhoward, dvlasenk, ezulian, fhrbata, hkrzesin, jarod, jburrell, jfaracco, jferlan, jforbes, jlelli, joe.lawrence, jshortt, jstancek, jwyatt, kcarcia, kernel-mgr, lgoncalv, lleshchi, lzampier, nmurray, ptalbert, qzhao, rogbas, rvrbovsk, scweaver, swood, tyberry, vkumar, walters, williams
Rohit Keshri 2023-01-30 20:03:35 UTC Depends On 2165710, 2165709, 2165711, 2165712
Paige Jung 2023-01-30 22:17:54 UTC Doc Text A use-after-free vulnerability was found in btf_dump_name_dups in tools/lib/bpf/btf_dump.c in libbpf in the Linux Kernel. A use-after-free flaw was found in btf_dump_name_dups in tools/lib/bpf/btf_dump.c in libbpf in the Linux Kernel. This issue occurs because the key stored in the hash table name_map is a string address, and the string memory is allocated by realloc() function. When the memory is resized by realloc() later, the old memory may be freed.
Red Hat Bugzilla 2023-04-01 08:39:46 UTC CC dhoward
Red Hat Bugzilla 2023-07-07 08:27:49 UTC Assignee security-response-team nobody

Back to bug 2165706