Back to bug 2029923
| Who | When | What | Removed | Added |
|---|---|---|---|---|
| Alex | 2021-12-07 15:07:54 UTC | CC | security-response-team | |
| Alex | 2021-12-07 15:08:22 UTC | Blocks | 2029320 | |
| Alex | 2021-12-08 11:28:08 UTC | Doc Text | A flaw read memory after free in the Linux kernel garbage collect for file handlers functionality was found in the way user calls close() and fget() simultaneously that potentially could trigger race condition. A local user could use this flaw to crash the system or escalate their privileges on the system. | |
| Alex | 2021-12-08 17:46:50 UTC | Doc Text | A flaw read memory after free in the Linux kernel garbage collect for file handlers functionality was found in the way user calls close() and fget() simultaneously that potentially could trigger race condition. A local user could use this flaw to crash the system or escalate their privileges on the system. | A flaw read memory after free in the Linux kernel garbage collect for Unix domain socket file handlers and garbage collection functionality was found in the way user calls close() and fget() simultaneously that potentially could trigger race condition. A local user could use this flaw to crash the system or escalate their privileges on the system. |
| Alex | 2021-12-08 17:55:37 UTC | Fixed In Version | kernel 5.16-rc4 | |
| Alex | 2021-12-08 18:01:03 UTC | Depends On | 2030418, 2030417, 2030416 | |
| Dhananjay Arunesh | 2021-12-09 11:14:02 UTC | Alias | CVE-2021-4083 | |
| Summary | EMBARGOED kernel: fget: check that the fd still exists after getting a ref to it | EMBARGOED CVE-2021-4083 kernel: fget: check that the fd still exists after getting a ref to it | ||
| Eric Christensen | 2021-12-09 18:14:44 UTC | Doc Text | A flaw read memory after free in the Linux kernel garbage collect for Unix domain socket file handlers and garbage collection functionality was found in the way user calls close() and fget() simultaneously that potentially could trigger race condition. A local user could use this flaw to crash the system or escalate their privileges on the system. | A read after free memory flaw in the Linux kernel's garbage collection for Unix domain socket file handlers was found in the way users call close() and fget() simultaneously that potentially could trigger a race condition. A local user could use this flaw to crash the system or escalate their privileges on the system. |
| RaTasha Tillery-Smith | 2021-12-09 18:45:16 UTC | Doc Text | A read after free memory flaw in the Linux kernel's garbage collection for Unix domain socket file handlers was found in the way users call close() and fget() simultaneously that potentially could trigger a race condition. A local user could use this flaw to crash the system or escalate their privileges on the system. | A read-after-free memory flaw was found in the Linux kernel's garbage collection for Unix domain socket file handlers in the way users call close() and fget() simultaneously and can potentially trigger a race condition. This flaw allows a local user to crash the system or escalate their privileges on the system. |
| Alex | 2021-12-13 18:16:40 UTC | Priority | medium | high |
| Severity | medium | high | ||
| Alex | 2021-12-14 11:32:23 UTC | Depends On | 2032306, 2032301, 2032305, 2032302, 2032308, 2032303, 2032304, 2032307, 2032300, 2032299 | |
| Alex | 2021-12-14 11:42:16 UTC | Group | qe_staff, security | |
| Summary | EMBARGOED CVE-2021-4083 kernel: fget: check that the fd still exists after getting a ref to it | CVE-2021-4083 kernel: fget: check that the fd still exists after getting a ref to it | ||
| CC | adscvr, airlied, alciregi, bskeggs, hdegoede, jarodwilson, jeremy, jglisse, jonathan, josef, jwboyer, kernel-maint, kernel-mgr, linville, masami256, mchehab, steved | |||
| Alex | 2021-12-14 14:19:43 UTC | Comment | 0 | updated |
| Alex | 2021-12-14 14:53:58 UTC | Depends On | 2032474, 2032477, 2032475, 2032478, 2032481, 2032479, 2032476, 2032480 | |
| Alex | 2021-12-14 14:57:17 UTC | CC | asavkov, ctoe, joe.lawrence, jpoimboe, jthierry, kpatch-maint, rhandlin, ycote | |
| Alex | 2021-12-14 15:02:12 UTC | Depends On | 2032489, 2032490, 2032492, 2032493, 2032495, 2032491, 2032496, 2032494 | |
| Stoyan Nikolov | 2021-12-15 09:37:30 UTC | CC | michal.skrivanek, mperina, nobody, sbonazzo | |
| Stoyan Nikolov | 2021-12-15 09:38:06 UTC | Depends On | 2032815, 2032816 | |
| Guilherme de Almeida Suckevicz | 2022-01-17 16:15:14 UTC | Blocks | 2032781 | |
| Sandro Bonazzola | 2022-02-21 14:45:33 UTC | Depends On | 2056596 | |
| errata-xmlrpc | 2022-03-10 15:13:15 UTC | Link ID | Red Hat Product Errata RHSA-2022:0821 | |
| errata-xmlrpc | 2022-03-10 15:31:36 UTC | Link ID | Red Hat Product Errata RHSA-2022:0823 | |
| errata-xmlrpc | 2022-03-10 15:54:24 UTC | Link ID | Red Hat Product Errata RHSA-2022:0820 | |
| errata-xmlrpc | 2022-03-14 10:19:12 UTC | Link ID | Red Hat Product Errata RHSA-2022:0851 | |
| errata-xmlrpc | 2022-03-15 13:36:43 UTC | Link ID | Red Hat Product Errata RHSA-2022:0925 | |
| errata-xmlrpc | 2022-03-17 16:28:05 UTC | Link ID | Red Hat Product Errata RHSA-2022:0958 | |
| errata-xmlrpc | 2022-03-29 08:50:50 UTC | Link ID | Red Hat Product Errata RHSA-2022:1104 | |
| errata-xmlrpc | 2022-03-29 09:07:18 UTC | Link ID | Red Hat Product Errata RHSA-2022:1103 | |
| errata-xmlrpc | 2022-03-29 09:54:46 UTC | Link ID | Red Hat Product Errata RHSA-2022:1107 | |
| errata-xmlrpc | 2022-04-05 08:47:52 UTC | Link ID | Red Hat Product Errata RHSA-2022:1185 | |
| errata-xmlrpc | 2022-04-05 17:16:12 UTC | Link ID | Red Hat Product Errata RHSA-2022:1198 | |
| errata-xmlrpc | 2022-04-05 17:16:50 UTC | Link ID | Red Hat Product Errata RHSA-2022:1199 | |
| errata-xmlrpc | 2022-04-06 18:40:47 UTC | Link ID | Red Hat Product Errata RHBA-2022:1261 | |
| errata-xmlrpc | 2022-04-07 09:03:02 UTC | Link ID | Red Hat Product Errata RHSA-2022:1263 | |
| errata-xmlrpc | 2022-04-08 13:26:45 UTC | Link ID | Red Hat Product Errata RHBA-2022:1282 | |
| errata-xmlrpc | 2022-04-12 11:21:17 UTC | Link ID | Red Hat Product Errata RHBA-2022:1317 | |
| errata-xmlrpc | 2022-04-12 15:37:13 UTC | Link ID | Red Hat Product Errata RHSA-2022:1324 | |
| errata-xmlrpc | 2022-04-13 19:58:44 UTC | Link ID | Red Hat Product Errata RHSA-2022:1373 | |
| errata-xmlrpc | 2022-04-19 15:05:12 UTC | Link ID | Red Hat Product Errata RHSA-2022:1413 | |
| errata-xmlrpc | 2022-04-19 16:19:02 UTC | Link ID | Red Hat Product Errata RHSA-2022:1418 | |
| errata-xmlrpc | 2022-04-20 16:20:39 UTC | Link ID | Red Hat Product Errata RHSA-2022:1455 | |
| errata-xmlrpc | 2022-04-25 20:01:57 UTC | Link ID | Red Hat Product Errata RHBA-2022:1533 | |
| errata-xmlrpc | 2022-05-10 14:40:31 UTC | Link ID | Red Hat Product Errata RHSA-2022:1975 | |
| errata-xmlrpc | 2022-05-10 14:46:30 UTC | Link ID | Red Hat Product Errata RHSA-2022:1988 | |
| errata-xmlrpc | 2022-05-11 13:21:07 UTC | Link ID | Red Hat Product Errata RHSA-2022:2189 | |
| errata-xmlrpc | 2022-05-12 11:27:00 UTC | Link ID | Red Hat Product Errata RHBA-2022:2229 | |
| errata-xmlrpc | 2022-05-18 11:46:45 UTC | Link ID | Red Hat Product Errata RHBA-2022:4630 | |
| errata-xmlrpc | 2022-05-19 05:11:12 UTC | Link ID | Red Hat Product Errata RHBA-2022:4693 | |
| errata-xmlrpc | 2022-06-03 13:48:33 UTC | Link ID | Red Hat Product Errata RHSA-2022:4896 | |
| Product Security DevOps Team | 2022-06-03 17:12:52 UTC | Resolution | --- | ERRATA |
| Status | NEW | CLOSED | ||
| Last Closed | 2022-06-03 17:12:52 UTC | |||
| errata-xmlrpc | 2022-06-08 18:40:19 UTC | Link ID | Red Hat Product Errata RHBA-2022:4969 | |
| errata-xmlrpc | 2022-06-16 11:23:38 UTC | Link ID | Red Hat Product Errata RHBA-2022:5088 |
Back to bug 2029923