Back to bug 2029923

Who When What Removed Added
Alex 2021-12-07 15:07:54 UTC CC security-response-team
Alex 2021-12-07 15:08:22 UTC Blocks 2029320
Alex 2021-12-08 11:28:08 UTC Doc Text A flaw read memory after free in the Linux kernel garbage collect for file handlers functionality was found in the way user calls close() and fget() simultaneously that potentially could trigger race condition. A local user could use this flaw to crash the system or escalate their privileges on the system.
Alex 2021-12-08 17:46:50 UTC Doc Text A flaw read memory after free in the Linux kernel garbage collect for file handlers functionality was found in the way user calls close() and fget() simultaneously that potentially could trigger race condition. A local user could use this flaw to crash the system or escalate their privileges on the system. A flaw read memory after free in the Linux kernel garbage collect for Unix domain socket file handlers and garbage collection functionality was found in the way user calls close() and fget() simultaneously that potentially could trigger race condition. A local user could use this flaw to crash the system or escalate their privileges on the system.
Alex 2021-12-08 17:55:37 UTC Fixed In Version kernel 5.16-rc4
Alex 2021-12-08 18:01:03 UTC Depends On 2030418, 2030417, 2030416
Dhananjay Arunesh 2021-12-09 11:14:02 UTC Alias CVE-2021-4083
Summary EMBARGOED kernel: fget: check that the fd still exists after getting a ref to it EMBARGOED CVE-2021-4083 kernel: fget: check that the fd still exists after getting a ref to it
Eric Christensen 2021-12-09 18:14:44 UTC Doc Text A flaw read memory after free in the Linux kernel garbage collect for Unix domain socket file handlers and garbage collection functionality was found in the way user calls close() and fget() simultaneously that potentially could trigger race condition. A local user could use this flaw to crash the system or escalate their privileges on the system. A read after free memory flaw in the Linux kernel's garbage collection for Unix domain socket file handlers was found in the way users call close() and fget() simultaneously that potentially could trigger a race condition. A local user could use this flaw to crash the system or escalate their privileges on the system.
RaTasha Tillery-Smith 2021-12-09 18:45:16 UTC Doc Text A read after free memory flaw in the Linux kernel's garbage collection for Unix domain socket file handlers was found in the way users call close() and fget() simultaneously that potentially could trigger a race condition. A local user could use this flaw to crash the system or escalate their privileges on the system. A read-after-free memory flaw was found in the Linux kernel's garbage collection for Unix domain socket file handlers in the way users call close() and fget() simultaneously and can potentially trigger a race condition. This flaw allows a local user to crash the system or escalate their privileges on the system.
Alex 2021-12-13 18:16:40 UTC Priority medium high
Severity medium high
Alex 2021-12-14 11:32:23 UTC Depends On 2032306, 2032301, 2032305, 2032302, 2032308, 2032303, 2032304, 2032307, 2032300, 2032299
Alex 2021-12-14 11:42:16 UTC Group qe_staff, security
Summary EMBARGOED CVE-2021-4083 kernel: fget: check that the fd still exists after getting a ref to it CVE-2021-4083 kernel: fget: check that the fd still exists after getting a ref to it
CC adscvr, airlied, alciregi, bskeggs, hdegoede, jarodwilson, jeremy, jglisse, jonathan, josef, jwboyer, kernel-maint, kernel-mgr, linville, masami256, mchehab, steved
Alex 2021-12-14 14:19:43 UTC Comment 0 updated
Alex 2021-12-14 14:53:58 UTC Depends On 2032474, 2032477, 2032475, 2032478, 2032481, 2032479, 2032476, 2032480
Alex 2021-12-14 14:57:17 UTC CC asavkov, ctoe, joe.lawrence, jpoimboe, jthierry, kpatch-maint, rhandlin, ycote
Alex 2021-12-14 15:02:12 UTC Depends On 2032489, 2032490, 2032492, 2032493, 2032495, 2032491, 2032496, 2032494
Stoyan Nikolov 2021-12-15 09:37:30 UTC CC michal.skrivanek, mperina, nobody, sbonazzo
Stoyan Nikolov 2021-12-15 09:38:06 UTC Depends On 2032815, 2032816
Guilherme de Almeida Suckevicz 2022-01-17 16:15:14 UTC Blocks 2032781
Sandro Bonazzola 2022-02-21 14:45:33 UTC Depends On 2056596
errata-xmlrpc 2022-03-10 15:13:15 UTC Link ID Red Hat Product Errata RHSA-2022:0821
errata-xmlrpc 2022-03-10 15:31:36 UTC Link ID Red Hat Product Errata RHSA-2022:0823
errata-xmlrpc 2022-03-10 15:54:24 UTC Link ID Red Hat Product Errata RHSA-2022:0820
errata-xmlrpc 2022-03-14 10:19:12 UTC Link ID Red Hat Product Errata RHSA-2022:0851
errata-xmlrpc 2022-03-15 13:36:43 UTC Link ID Red Hat Product Errata RHSA-2022:0925
errata-xmlrpc 2022-03-17 16:28:05 UTC Link ID Red Hat Product Errata RHSA-2022:0958
errata-xmlrpc 2022-03-29 08:50:50 UTC Link ID Red Hat Product Errata RHSA-2022:1104
errata-xmlrpc 2022-03-29 09:07:18 UTC Link ID Red Hat Product Errata RHSA-2022:1103
errata-xmlrpc 2022-03-29 09:54:46 UTC Link ID Red Hat Product Errata RHSA-2022:1107
errata-xmlrpc 2022-04-05 08:47:52 UTC Link ID Red Hat Product Errata RHSA-2022:1185
errata-xmlrpc 2022-04-05 17:16:12 UTC Link ID Red Hat Product Errata RHSA-2022:1198
errata-xmlrpc 2022-04-05 17:16:50 UTC Link ID Red Hat Product Errata RHSA-2022:1199
errata-xmlrpc 2022-04-06 18:40:47 UTC Link ID Red Hat Product Errata RHBA-2022:1261
errata-xmlrpc 2022-04-07 09:03:02 UTC Link ID Red Hat Product Errata RHSA-2022:1263
errata-xmlrpc 2022-04-08 13:26:45 UTC Link ID Red Hat Product Errata RHBA-2022:1282
errata-xmlrpc 2022-04-12 11:21:17 UTC Link ID Red Hat Product Errata RHBA-2022:1317
errata-xmlrpc 2022-04-12 15:37:13 UTC Link ID Red Hat Product Errata RHSA-2022:1324
errata-xmlrpc 2022-04-13 19:58:44 UTC Link ID Red Hat Product Errata RHSA-2022:1373
errata-xmlrpc 2022-04-19 15:05:12 UTC Link ID Red Hat Product Errata RHSA-2022:1413
errata-xmlrpc 2022-04-19 16:19:02 UTC Link ID Red Hat Product Errata RHSA-2022:1418
errata-xmlrpc 2022-04-20 16:20:39 UTC Link ID Red Hat Product Errata RHSA-2022:1455
errata-xmlrpc 2022-04-25 20:01:57 UTC Link ID Red Hat Product Errata RHBA-2022:1533
errata-xmlrpc 2022-05-10 14:40:31 UTC Link ID Red Hat Product Errata RHSA-2022:1975
errata-xmlrpc 2022-05-10 14:46:30 UTC Link ID Red Hat Product Errata RHSA-2022:1988
errata-xmlrpc 2022-05-11 13:21:07 UTC Link ID Red Hat Product Errata RHSA-2022:2189
errata-xmlrpc 2022-05-12 11:27:00 UTC Link ID Red Hat Product Errata RHBA-2022:2229
errata-xmlrpc 2022-05-18 11:46:45 UTC Link ID Red Hat Product Errata RHBA-2022:4630
errata-xmlrpc 2022-05-19 05:11:12 UTC Link ID Red Hat Product Errata RHBA-2022:4693
errata-xmlrpc 2022-06-03 13:48:33 UTC Link ID Red Hat Product Errata RHSA-2022:4896
Product Security DevOps Team 2022-06-03 17:12:52 UTC Resolution --- ERRATA
Status NEW CLOSED
Last Closed 2022-06-03 17:12:52 UTC
errata-xmlrpc 2022-06-08 18:40:19 UTC Link ID Red Hat Product Errata RHBA-2022:4969
errata-xmlrpc 2022-06-16 11:23:38 UTC Link ID Red Hat Product Errata RHBA-2022:5088

Back to bug 2029923