Back to bug 2031928
| Who | When | What | Removed | Added |
|---|---|---|---|---|
| Michael Kaplan | 2021-12-13 17:52:51 UTC | Depends On | 2031929 | |
| Michael Kaplan | 2021-12-13 17:52:54 UTC | Blocks | 2030656 | |
| Michael Kaplan | 2021-12-13 18:00:44 UTC | Severity | medium | high |
| Priority | medium | high | ||
| Rohit Keshri | 2021-12-13 18:40:44 UTC | Doc Text | A use-after-free flaw was found in ep_loop_check_proc in fs/eventpoll.c in the filesystem. This flaw could allow an attacker to crash the system while polling for a file that is already committed to destruction. This vulnerability could lead to a kernel information leak and a privilege escalation problem. | |
| Rohit Keshri | 2021-12-13 18:41:18 UTC | CC | blc, mlangsdo | |
| Rohit Keshri | 2021-12-13 18:43:54 UTC | CC | asavkov, ctoe, joe.lawrence, jpoimboe, jthierry, kpatch-maint, rhandlin, ycote | |
| Rohit Keshri | 2021-12-13 18:52:41 UTC | Depends On | 2031950, 2031949, 2031944, 2031951, 2031946, 2031948, 2031953, 2031954, 2031945, 2031943, 2031942, 2031947, 2031952 | |
| Rohit Keshri | 2021-12-13 18:55:10 UTC | Comment | 0 | updated |
| Rohit Keshri | 2021-12-13 18:55:36 UTC | CC | rkeshri | |
| Eric Sandeen | 2021-12-13 22:47:14 UTC | Flags | needinfo?(mkaplan) | |
| CC | esandeen | |||
| Rohit Keshri | 2021-12-14 05:21:28 UTC | Flags | needinfo?(mkaplan) | |
| Stoyan Nikolov | 2021-12-15 09:39:06 UTC | CC | bdettelb | |
| Depends On | 2032650 | |||
| CC | michal.skrivanek, mperina, nobody, sbonazzo | |||
| Stoyan Nikolov | 2021-12-15 09:39:50 UTC | Depends On | 2032817 | |
| Carlos Maiolino | 2021-12-16 10:41:51 UTC | CC | cmaiolin | |
| Flags | needinfo?(rkeshri) | |||
| Eric Christensen | 2021-12-17 17:11:58 UTC | Doc Text | A use-after-free flaw was found in ep_loop_check_proc in fs/eventpoll.c in the filesystem. This flaw could allow an attacker to crash the system while polling for a file that is already committed to destruction. This vulnerability could lead to a kernel information leak and a privilege escalation problem. | A use-after-free flaw was found in Linux kernel's ep_loop_check_proc in fs/eventpoll.c function in the filesystem. This flaw could allow an attacker to crash the system while polling for a file that is already committed to destruction. This vulnerability could lead to a kernel information leak and a privilege escalation problem. |
| Carlos Maiolino | 2021-12-18 08:17:23 UTC | Flags | needinfo?(rkeshri) | |
| Hardik Vyas | 2021-12-20 05:13:56 UTC | Fixed In Version | kernel 5.9 rc4 | |
| Carlos Maiolino | 2022-01-26 09:54:24 UTC | Flags | needinfo?(rhandlin) | |
| Bob Handlin | 2022-01-26 10:59:59 UTC | Flags | needinfo?(rhandlin) | |
| Red Hat Bugzilla | 2022-06-04 08:04:31 UTC | CC | fpacheco | |
| Red Hat Bugzilla | 2022-07-16 03:20:19 UTC | CC | brdeoliv | |
| Red Hat Bugzilla | 2022-08-12 04:29:28 UTC | CC | ctoe | |
| Sandro Bonazzola | 2022-11-18 15:43:33 UTC | CC | sbonazzo | |
| Red Hat Bugzilla | 2022-12-31 23:34:37 UTC | CC | fhrbata | |
| Red Hat Bugzilla | 2023-04-01 08:39:39 UTC | CC | dhoward | |
| Red Hat Bugzilla | 2023-07-07 08:29:49 UTC | Assignee | security-response-team | nobody |
Back to bug 2031928