Back to bug 1822593
| Who | When | What | Removed | Added |
|---|---|---|---|---|
| Guilherme de Almeida Suckevicz | 2020-04-09 12:59:44 UTC | CC | security-response-team | |
| Guilherme de Almeida Suckevicz | 2020-04-09 13:03:35 UTC | Summary | EMBARGOED kernel: race condition in kernel/audit.c may allow low privilege users trigger kernel panic | EMBARGOED CVE-2020-10708 kernel: race condition in kernel/audit.c may allow low privilege users trigger kernel panic |
| Alias | CVE-2020-10708 | |||
| Guilherme de Almeida Suckevicz | 2020-04-09 13:06:10 UTC | Blocks | 1819337 | |
| RaTasha Tillery-Smith | 2020-04-09 13:14:11 UTC | Doc Text | A race condition flaw was found in the Linux kernel audit subsystem. When the system is configured to panic on events being dropped, an attacker can use this flaw to trigger an audit event that begins while the audit is in the process of starting, causing the system to panic by exploiting a race condition in the audit event handling. This attack results in a denial of service. | |
| Wade Mealing | 2020-04-16 06:11:56 UTC | CC | 530415489, wmealing | |
| Wade Mealing | 2020-04-17 06:11:31 UTC | Depends On | 1825110, 1825111 | |
| Petr Matousek | 2020-04-17 08:56:06 UTC | Group | security, qe_staff | |
| CC | airlied, bskeggs, hdegoede, ichavero, itamar, jarodwilson, jeremy, jforbes, jglisse, john.j5live, jonathan, josef, jwboyer, kernel-maint, kernel-mgr, labbott, linville, masami256, mchehab, mjg59, rt-maint, steved | |||
| Summary | EMBARGOED CVE-2020-10708 kernel: race condition in kernel/audit.c may allow low privilege users trigger kernel panic | CVE-2020-10708 kernel: race condition in kernel/audit.c may allow low privilege users trigger kernel panic | ||
| Petr Matousek | 2020-04-17 08:56:57 UTC | Depends On | 1825156 | |
| Matt | 2020-04-17 12:01:00 UTC | CC | mvanderw | |
| Richard Guy Briggs | 2020-04-17 19:18:51 UTC | CC | rbriggs | |
| Steve Grubb | 2020-04-17 20:20:11 UTC | CC | sgrubb | |
| Wade Mealing | 2020-04-27 01:27:53 UTC | Flags | needinfo?(sgrubb) | |
| Steve Grubb | 2020-04-27 02:43:26 UTC | Flags | needinfo?(sgrubb) | |
| Wade Mealing | 2020-05-05 01:12:40 UTC | Flags | needinfo?(sgrubb) | |
| Wade Mealing | 2020-05-07 00:55:59 UTC | Doc Text | A race condition flaw was found in the Linux kernel audit subsystem. When the system is configured to panic on events being dropped, an attacker can use this flaw to trigger an audit event that begins while the audit is in the process of starting, causing the system to panic by exploiting a race condition in the audit event handling. This attack results in a denial of service. | A flaw was found in the implementation of audit service where it may be possible to exceed the number of events while the audit service is being restarted (ie, while it is being upgraded) that could allow a local user to panic the system. |
| Steve Grubb | 2020-05-07 12:44:54 UTC | Flags | needinfo?(sgrubb) | |
| Petr Matousek | 2020-05-27 15:07:12 UTC | CC | pmatouse | |
| PnT Account Manager | 2020-09-15 20:43:32 UTC | Summary | CVE-2020-10708 kernel: race condition in kernel/audit.c may allow low privilege users trigger kernel panic | kernel: race condition in kernel/audit.c may allow low privilege users trigger kernel panic |
| Alias | CVE-2020-10708 | |||
| CC | labbott | |||
| Red Hat Bugzilla | 2021-03-23 23:40:32 UTC | CC | matt | |
| Red Hat Bugzilla | 2021-05-30 12:02:52 UTC | CC | blc | |
| Red Hat Bugzilla | 2021-05-30 12:38:05 UTC | CC | bhu | |
| Jeff Fearn 🐞 | 2021-06-03 11:10:01 UTC | CC | blc | |
| Jeff Fearn 🐞 | 2021-06-03 11:57:54 UTC | CC | bhu | |
| Red Hat Bugzilla | 2021-09-15 05:46:24 UTC | CC | jglisse | |
| Red Hat Bugzilla | 2022-04-23 08:29:00 UTC | CC | esammons | |
| Red Hat Bugzilla | 2022-07-16 03:20:24 UTC | CC | brdeoliv | |
| Red Hat Bugzilla | 2022-12-31 23:34:45 UTC | CC | fhrbata | |
| Red Hat Bugzilla | 2023-04-01 08:39:46 UTC | CC | dhoward | |
| Red Hat Bugzilla | 2023-06-14 21:29:50 UTC | CC | mcressma | |
| Red Hat Bugzilla | 2023-07-07 08:29:53 UTC | Assignee | security-response-team | nobody |
| CC | security-response-team |
Back to bug 1822593