Back to bug 1822593

Who When What Removed Added
Guilherme de Almeida Suckevicz 2020-04-09 12:59:44 UTC CC security-response-team
Guilherme de Almeida Suckevicz 2020-04-09 13:03:35 UTC Summary EMBARGOED kernel: race condition in kernel/audit.c may allow low privilege users trigger kernel panic EMBARGOED CVE-2020-10708 kernel: race condition in kernel/audit.c may allow low privilege users trigger kernel panic
Alias CVE-2020-10708
Guilherme de Almeida Suckevicz 2020-04-09 13:06:10 UTC Blocks 1819337
RaTasha Tillery-Smith 2020-04-09 13:14:11 UTC Doc Text A race condition flaw was found in the Linux kernel audit subsystem. When the system is configured to panic on events being dropped, an attacker can use this flaw to trigger an audit event that begins while the audit is in the process of starting, causing the system to panic by exploiting a race condition in the audit event handling. This attack results in a denial of service.
Wade Mealing 2020-04-16 06:11:56 UTC CC 530415489, wmealing
Wade Mealing 2020-04-17 06:11:31 UTC Depends On 1825110, 1825111
Petr Matousek 2020-04-17 08:56:06 UTC Group security, qe_staff
CC airlied, bskeggs, hdegoede, ichavero, itamar, jarodwilson, jeremy, jforbes, jglisse, john.j5live, jonathan, josef, jwboyer, kernel-maint, kernel-mgr, labbott, linville, masami256, mchehab, mjg59, rt-maint, steved
Summary EMBARGOED CVE-2020-10708 kernel: race condition in kernel/audit.c may allow low privilege users trigger kernel panic CVE-2020-10708 kernel: race condition in kernel/audit.c may allow low privilege users trigger kernel panic
Petr Matousek 2020-04-17 08:56:57 UTC Depends On 1825156
Matt 2020-04-17 12:01:00 UTC CC mvanderw
Richard Guy Briggs 2020-04-17 19:18:51 UTC CC rbriggs
Steve Grubb 2020-04-17 20:20:11 UTC CC sgrubb
Wade Mealing 2020-04-27 01:27:53 UTC Flags needinfo?(sgrubb)
Steve Grubb 2020-04-27 02:43:26 UTC Flags needinfo?(sgrubb)
Wade Mealing 2020-05-05 01:12:40 UTC Flags needinfo?(sgrubb)
Wade Mealing 2020-05-07 00:55:59 UTC Doc Text A race condition flaw was found in the Linux kernel audit subsystem. When the system is configured to panic on events being dropped, an attacker can use this flaw to trigger an audit event that begins while the audit is in the process of starting, causing the system to panic by exploiting a race condition in the audit event handling. This attack results in a denial of service. A flaw was found in the implementation of audit service where it may be possible to exceed the number of events while the audit service is being restarted (ie, while it is being upgraded) that could allow a local user to panic the system.
Steve Grubb 2020-05-07 12:44:54 UTC Flags needinfo?(sgrubb)
Petr Matousek 2020-05-27 15:07:12 UTC CC pmatouse
PnT Account Manager 2020-09-15 20:43:32 UTC Summary CVE-2020-10708 kernel: race condition in kernel/audit.c may allow low privilege users trigger kernel panic kernel: race condition in kernel/audit.c may allow low privilege users trigger kernel panic
Alias CVE-2020-10708
CC labbott
Red Hat Bugzilla 2021-03-23 23:40:32 UTC CC matt
Red Hat Bugzilla 2021-05-30 12:02:52 UTC CC blc
Red Hat Bugzilla 2021-05-30 12:38:05 UTC CC bhu
Jeff Fearn 🐞 2021-06-03 11:10:01 UTC CC blc
Jeff Fearn 🐞 2021-06-03 11:57:54 UTC CC bhu
Red Hat Bugzilla 2021-09-15 05:46:24 UTC CC jglisse
Red Hat Bugzilla 2022-04-23 08:29:00 UTC CC esammons
Red Hat Bugzilla 2022-07-16 03:20:24 UTC CC brdeoliv
Red Hat Bugzilla 2022-12-31 23:34:45 UTC CC fhrbata
Red Hat Bugzilla 2023-04-01 08:39:46 UTC CC dhoward
Red Hat Bugzilla 2023-06-14 21:29:50 UTC CC mcressma
Red Hat Bugzilla 2023-07-07 08:29:53 UTC Assignee security-response-team nobody
CC security-response-team

Back to bug 1822593