More information about this security flaw is available in the following bug: https://bugzilla.redhat.com/show_bug.cgi?id=2301541 Disclaimer: Community trackers are created by Red Hat Product Security team on a best effort basis. Package maintainers are required to ascertain if the flaw indeed affects their package, before starting the update process.
There's not enough context here for me to tell anything. How does an integer overflow in a kernel driver have any relationship to Apache Arrow libraries running in user space?
No javascript
(In reply to Kaleb KEITHLEY from comment #1) > There's not enough context here for me to tell anything. > > How does an integer overflow in a kernel driver have any relationship to > Apache Arrow libraries running in user space? Thanks for review