Back to bug 2213455
| Who | When | What | Removed | Added |
|---|---|---|---|---|
| Rohit Keshri | 2023-06-08 08:49:52 UTC | CC | acaringi, allarkin, bhu, chwhite, dbohanno, ddepaula, debarbos, dvlasenk, ezulian, hkrzesin, jarod, jdenham, jfaracco, jferlan, jforbes, jlelli, joe.lawrence, jshortt, jstancek, jwyatt, kcarcia, kernel-mgr, ldoskova, lgoncalv, lleshchi, lzampier, nmurray, ptalbert, qzhao, rrobaina, rvrbovsk, rysulliv, scweaver, swood, tyberry, walters, wcosta, williams, wmealing, ycote | |
| Rohit Keshri | 2023-06-08 09:14:24 UTC | CC | dfreiber, jburrell, rogbas, vkumar | |
| Rohit Keshri | 2023-06-08 11:11:37 UTC | Depends On | 2213498, 2213508, 2213507, 2213510, 2213512, 2213511, 2213499, 2213504, 2213503, 2213506, 2213501, 2213500, 2213509, 2213502, 2213505 | |
| Rohit Keshri | 2023-06-08 11:25:42 UTC | Doc Text | A vulnerability was found in __efi_rt_asm_wrapper of efi-rt-wrapper.S, there is a possible bypass of shadow stack protection due to a logic error in the code. This flaw could lead to local escalation of privilege with no additional execution privileges needed. | |
| RaTasha Tillery-Smith | 2023-06-08 14:17:21 UTC | Doc Text | A vulnerability was found in __efi_rt_asm_wrapper of efi-rt-wrapper.S, there is a possible bypass of shadow stack protection due to a logic error in the code. This flaw could lead to local escalation of privilege with no additional execution privileges needed. | A vulnerability was found in the __efi_rt_asm_wrapper of the efi-rt-wrapper.S in the Linux kernel, where there is a possible bypass of shadow stack protection due to a logic error in the code. This flaw could lead to local escalation of privilege without additional execution privileges needed. |
| Rohit Keshri | 2023-06-13 06:48:08 UTC | Depends On | 2214493 | |
| Red Hat Bugzilla | 2023-07-07 08:27:55 UTC | Assignee | security-response-team | nobody |
Back to bug 2213455