Back to bug 2173430

Who When What Removed Added
Alex 2023-02-26 16:56:36 UTC Comment 0 updated
Alex 2023-02-26 16:56:58 UTC Doc Type --- If docs needed, set a value
Summary kernel: HID: betop: check shape of output reports kernel: sctp: fail if no bound addresses can be used for a given scope
Alex 2023-02-27 18:20:52 UTC Summary kernel: sctp: fail if no bound addresses can be used for a given scope CVE-2023-1074 kernel: sctp: fail if no bound addresses can be used for a given scope
Alias CVE-2023-1074
Paige Jung 2023-02-27 19:45:41 UTC Doc Text A flaw memory leak in the Linux kernel Stream Control Transmission Protocol was found in the way user starts malicious networking service and then someone connects to this service. A local user could use this flaw to starve the resources causing denial of service. A memory leak flaw was found in the Linux kernel's Stream Control Transmission Protocol. This issue may occur when a user starts a malicious networking service and someone connects to this service. This could allow a local user to starve resources, causing a denial of service.
Red Hat Bugzilla 2023-04-01 08:42:37 UTC CC dhoward
Alex 2023-06-04 14:13:25 UTC Depends On 2212169
Alex 2023-06-04 14:15:21 UTC Fixed In Version kernel 6.2-rc6
Alex 2023-06-04 14:18:21 UTC Depends On 2212171, 2212173, 2212174, 2212172
Alex 2023-06-04 14:19:39 UTC Severity low medium
Priority low medium
Xin Long 2023-06-07 21:47:03 UTC Depends On 2189292
Xin Long 2023-06-07 21:49:31 UTC Depends On 2189324
Red Hat Bugzilla 2023-07-07 08:33:33 UTC Assignee security-response-team nobody

Back to bug 2173430