Back to bug 2165706
| Who | When | What | Removed | Added |
|---|---|---|---|---|
| Rohit Keshri | 2023-01-30 19:59:01 UTC | Fixed In Version | Kernel 6.2 RC1 | |
| Rohit Keshri | 2023-01-30 20:00:57 UTC | CC | acaringi, bhu, chwhite, ddepaula, debarbos, dfreiber, dhoward, dvlasenk, ezulian, fhrbata, hkrzesin, jarod, jburrell, jfaracco, jferlan, jforbes, jlelli, joe.lawrence, jshortt, jstancek, jwyatt, kcarcia, kernel-mgr, lgoncalv, lleshchi, lzampier, nmurray, ptalbert, qzhao, rogbas, rvrbovsk, scweaver, swood, tyberry, vkumar, walters, williams | |
| Rohit Keshri | 2023-01-30 20:03:35 UTC | Depends On | 2165710, 2165709, 2165711, 2165712 | |
| Paige Jung | 2023-01-30 22:17:54 UTC | Doc Text | A use-after-free vulnerability was found in btf_dump_name_dups in tools/lib/bpf/btf_dump.c in libbpf in the Linux Kernel. | A use-after-free flaw was found in btf_dump_name_dups in tools/lib/bpf/btf_dump.c in libbpf in the Linux Kernel. This issue occurs because the key stored in the hash table name_map is a string address, and the string memory is allocated by realloc() function. When the memory is resized by realloc() later, the old memory may be freed. |
| Red Hat Bugzilla | 2023-04-01 08:39:46 UTC | CC | dhoward | |
| Red Hat Bugzilla | 2023-07-07 08:27:49 UTC | Assignee | security-response-team | nobody |
Back to bug 2165706