Back to bug 2213455

Who When What Removed Added
Rohit Keshri 2023-06-08 08:49:52 UTC CC acaringi, allarkin, bhu, chwhite, dbohanno, ddepaula, debarbos, dvlasenk, ezulian, hkrzesin, jarod, jdenham, jfaracco, jferlan, jforbes, jlelli, joe.lawrence, jshortt, jstancek, jwyatt, kcarcia, kernel-mgr, ldoskova, lgoncalv, lleshchi, lzampier, nmurray, ptalbert, qzhao, rrobaina, rvrbovsk, rysulliv, scweaver, swood, tyberry, walters, wcosta, williams, wmealing, ycote
Rohit Keshri 2023-06-08 09:14:24 UTC CC dfreiber, jburrell, rogbas, vkumar
Rohit Keshri 2023-06-08 11:11:37 UTC Depends On 2213498, 2213508, 2213507, 2213510, 2213512, 2213511, 2213499, 2213504, 2213503, 2213506, 2213501, 2213500, 2213509, 2213502, 2213505
Rohit Keshri 2023-06-08 11:25:42 UTC Doc Text A vulnerability was found in __efi_rt_asm_wrapper of efi-rt-wrapper.S, there is a possible bypass of shadow stack protection due to a logic error in the code. This flaw could lead to local escalation of privilege with no additional execution privileges needed.
RaTasha Tillery-Smith 2023-06-08 14:17:21 UTC Doc Text A vulnerability was found in __efi_rt_asm_wrapper of efi-rt-wrapper.S, there is a possible bypass of shadow stack protection due to a logic error in the code. This flaw could lead to local escalation of privilege with no additional execution privileges needed. A vulnerability was found in the __efi_rt_asm_wrapper of the efi-rt-wrapper.S in the Linux kernel, where there is a possible bypass of shadow stack protection due to a logic error in the code. This flaw could lead to local escalation of privilege without additional execution privileges needed.
Rohit Keshri 2023-06-13 06:48:08 UTC Depends On 2214493
Red Hat Bugzilla 2023-07-07 08:27:55 UTC Assignee security-response-team nobody

Back to bug 2213455