Back to bug 2173430
| Who | When | What | Removed | Added |
|---|---|---|---|---|
| Alex | 2023-02-26 16:56:36 UTC | Comment | 0 | updated |
| Alex | 2023-02-26 16:56:58 UTC | Doc Type | --- | If docs needed, set a value |
| Summary | kernel: HID: betop: check shape of output reports | kernel: sctp: fail if no bound addresses can be used for a given scope | ||
| Alex | 2023-02-27 18:20:52 UTC | Summary | kernel: sctp: fail if no bound addresses can be used for a given scope | CVE-2023-1074 kernel: sctp: fail if no bound addresses can be used for a given scope |
| Alias | CVE-2023-1074 | |||
| Paige Jung | 2023-02-27 19:45:41 UTC | Doc Text | A flaw memory leak in the Linux kernel Stream Control Transmission Protocol was found in the way user starts malicious networking service and then someone connects to this service. A local user could use this flaw to starve the resources causing denial of service. | A memory leak flaw was found in the Linux kernel's Stream Control Transmission Protocol. This issue may occur when a user starts a malicious networking service and someone connects to this service. This could allow a local user to starve resources, causing a denial of service. |
| Red Hat Bugzilla | 2023-04-01 08:42:37 UTC | CC | dhoward | |
| Alex | 2023-06-04 14:13:25 UTC | Depends On | 2212169 | |
| Alex | 2023-06-04 14:15:21 UTC | Fixed In Version | kernel 6.2-rc6 | |
| Alex | 2023-06-04 14:18:21 UTC | Depends On | 2212171, 2212173, 2212174, 2212172 | |
| Alex | 2023-06-04 14:19:39 UTC | Severity | low | medium |
| Priority | low | medium | ||
| Xin Long | 2023-06-07 21:47:03 UTC | Depends On | 2189292 | |
| Xin Long | 2023-06-07 21:49:31 UTC | Depends On | 2189324 | |
| Red Hat Bugzilla | 2023-07-07 08:33:33 UTC | Assignee | security-response-team | nobody |
Back to bug 2173430