Back to bug 2181330
| Who | When | What | Removed | Added |
|---|---|---|---|---|
| Pedro Sampaio | 2023-03-23 17:43:13 UTC | Blocks | 2181331 | |
| Rohit Keshri | 2023-06-04 19:20:30 UTC | Fixed In Version | Kernel 5.14-rc1 | |
| Rohit Keshri | 2023-06-04 19:34:49 UTC | Depends On | 2212207, 2212208 | |
| Rohit Keshri | 2023-06-06 06:42:44 UTC | Doc Text | A buffer overflow write flaw was identified in seq_buf_putmem_hex in lib/seq_buf.c in seq_buf in the Linux Kernel. A user with special debug privilege (like ftrace, or root) may cause an overflow in the destination buffer due to a missing sanity check. | |
| Paige Jung | 2023-06-06 14:15:46 UTC | Doc Text | A buffer overflow write flaw was identified in seq_buf_putmem_hex in lib/seq_buf.c in seq_buf in the Linux Kernel. A user with special debug privilege (like ftrace, or root) may cause an overflow in the destination buffer due to a missing sanity check. | A buffer overflow write flaw was identified in seq_buf_putmem_hex in lib/seq_buf.c in seq_buf in the Linux Kernel. This issue may allow a user with special debug privileges such as ftrace or root to cause an overflow in the destination buffer due to a missing sanity check. |
| Red Hat Bugzilla | 2023-07-07 08:28:16 UTC | Assignee | security-response-team | nobody |
Back to bug 2181330