Back to bug 2230156
| Who | When | What | Removed | Added |
|---|---|---|---|---|
| Pedro Sampaio | 2023-08-08 19:24:31 UTC | Depends On | 2230157 | |
| Pedro Sampaio | 2023-08-08 19:26:24 UTC | Blocks | 2230159 | |
| Mauro Matteo Cascella | 2023-08-09 07:35:37 UTC | Alias | TRIAGE-CVE-2023-34319 | CVE-2023-34319 |
| Summary | TRIAGE-CVE-2023-34319 XSA-432 xen: Buffer overrun in netback due to unusual packet | CVE-2023-34319 xen: buffer overrun in netback due to unusual packet (XSA-432) | ||
| Mauro Matteo Cascella | 2023-08-09 07:42:14 UTC | Doc Text | A buffer overrun issue was found in the netback driver in Xen due to unusual split packet. An unprivileged guest can cause Denial of Service (DoS) of the host by sending network packets to the backend, causing the backend to crash. | |
| Product Security DevOps Team | 2023-08-09 12:08:35 UTC | Status | NEW | CLOSED |
| Resolution | --- | NOTABUG | ||
| Last Closed | 2023-08-09 12:08:35 UTC | |||
| RaTasha Tillery-Smith | 2023-08-09 14:13:03 UTC | Doc Text | A buffer overrun issue was found in the netback driver in Xen due to unusual split packet. An unprivileged guest can cause Denial of Service (DoS) of the host by sending network packets to the backend, causing the backend to crash. | A buffer overrun vulnerability was found in the netback driver in Xen due to an unusual split packet. This flaw allows an unprivileged guest to cause a denial of service (DoS) of the host by sending network packets to the backend, causing the backend to crash. |
Back to bug 2230156