Back to bug 2114849

Who When What Removed Added
Marian Rehak 2022-08-03 11:50:01 UTC CC security-response-team
Marian Rehak 2022-08-03 11:50:20 UTC Blocks 2114850
Rohit Keshri 2022-08-08 09:17:43 UTC Priority high medium
Severity high medium
Rohit Keshri 2022-08-08 09:55:05 UTC Depends On 2116328, 2116326, 2116325, 2116327
Rohit Keshri 2022-08-08 10:00:40 UTC CC dbohanno, rkeshri
Rohit Keshri 2022-08-08 10:09:19 UTC Doc Text A use-after-free flaw was found in route4_change in net/sched/cls_route.c filter implementation in the Linux kernel. This flaw could allow a local user-privileged attacker to crash the system, and may even lead to a Local Privilege Escalation problem.
RaTasha Tillery-Smith 2022-08-08 12:28:10 UTC Doc Text A use-after-free flaw was found in route4_change in net/sched/cls_route.c filter implementation in the Linux kernel. This flaw could allow a local user-privileged attacker to crash the system, and may even lead to a Local Privilege Escalation problem. A use-after-free flaw was found in route4_change in the net/sched/cls_route.c filter implementation in the Linux kernel. This flaw allows a local, privileged attacker to crash the system, possibly leading to a local privilege escalation issue.
Rohit Keshri 2022-08-09 18:19:09 UTC Deadline 2022-08-09
Summary EMBARGOED CVE-2022-2588 kernel: a use-after-free in cls_route filter implementation may lead to privilege escalation CVE-2022-2588 kernel: a use-after-free in cls_route filter implementation may lead to privilege escalation
CC adscvr, airlied, alciregi, bskeggs, hdegoede, hpa, jarodwilson, jglisse, jonathan, josef, jwboyer, kernel-maint, kernel-mgr, linville, masami256, mchehab, steved
Group qe_staff, security
Rohit Keshri 2022-08-09 18:19:43 UTC Depends On 2117014
Steve Outteridge 2022-08-24 10:35:44 UTC CC soutteri
Srikanth Balasubramanian 2022-08-25 06:17:49 UTC CC sbalasub
Rohit Keshri 2022-08-26 15:31:10 UTC Doc Text A use-after-free flaw was found in route4_change in the net/sched/cls_route.c filter implementation in the Linux kernel. This flaw allows a local, privileged attacker to crash the system, possibly leading to a local privilege escalation issue. A use-after-free flaw was found in route4_change in the net/sched/cls_route.c filter implementation in the Linux kernel. This flaw allows a local user to crash the system and possibly lead to a local privilege escalation problem.
Rohit Keshri 2022-08-26 17:14:20 UTC Depends On 2121817, 2121810, 2121814, 2121813, 2121808, 2121812, 2121809, 2121815, 2121806, 2121807, 2121816, 2121819, 2121811, 2121818, 2121820
Li Shuang 2022-08-29 02:40:08 UTC CC shuali
QA Contact shuali
Petr Matousek 2022-08-29 10:16:14 UTC Severity medium high
Priority medium high
Rohit Keshri 2022-08-30 10:35:49 UTC CC ctoe, jpoimboe, kpatch-maint, rhandlin, ycote
Rohit Keshri 2022-08-30 10:40:19 UTC Depends On 2122584, 2122582, 2122586, 2122585, 2122583, 2122581
Matt 2022-08-30 18:44:12 UTC CC mvanderw
Donovan 2022-09-05 06:15:30 UTC CC donovan.debeuckelaer
Stoyan Nikolov 2022-09-06 12:48:23 UTC CC michal.skrivanek, mperina, sbonazzo
Stoyan Nikolov 2022-09-06 12:51:08 UTC Depends On 2124536
Michael Schwabe 2022-09-07 13:00:20 UTC CC mschwabe
Rohit Keshri 2022-09-09 08:23:30 UTC Depends On 2125517
errata-xmlrpc 2022-09-19 11:50:40 UTC CC mhernon
Link ID Red Hat Product Errata RHSA-2022:6551
Alex 2022-10-07 11:55:58 UTC Blocks 1993988
CC allarkin
errata-xmlrpc 2022-10-11 12:32:15 UTC Link ID Red Hat Product Errata RHSA-2022:6872
errata-xmlrpc 2022-10-11 12:38:33 UTC Link ID Red Hat Product Errata RHSA-2022:6875
errata-xmlrpc 2022-10-18 07:41:49 UTC Link ID Red Hat Product Errata RHSA-2022:6978
errata-xmlrpc 2022-10-18 08:09:03 UTC Link ID Red Hat Product Errata RHSA-2022:6991
errata-xmlrpc 2022-10-18 08:15:34 UTC Link ID Red Hat Product Errata RHSA-2022:6983
errata-xmlrpc 2022-10-25 08:45:05 UTC Link ID Red Hat Product Errata RHSA-2022:7110
errata-xmlrpc 2022-10-25 08:56:40 UTC Link ID Red Hat Product Errata RHSA-2022:7137
errata-xmlrpc 2022-10-25 08:59:01 UTC Link ID Red Hat Product Errata RHSA-2022:7134
errata-xmlrpc 2022-10-25 10:34:04 UTC Link ID Red Hat Product Errata RHSA-2022:7146
errata-xmlrpc 2022-10-25 13:07:03 UTC Link ID Red Hat Product Errata RHSA-2022:7171
errata-xmlrpc 2022-10-25 13:11:03 UTC Link ID Red Hat Product Errata RHSA-2022:7173
errata-xmlrpc 2022-10-25 22:38:30 UTC Link ID Red Hat Product Errata RHBA-2022:7198
errata-xmlrpc 2022-11-01 10:45:15 UTC Link ID Red Hat Product Errata RHBA-2022:7269
errata-xmlrpc 2022-11-01 14:17:37 UTC Link ID Red Hat Product Errata RHSA-2022:7279
errata-xmlrpc 2022-11-01 14:18:15 UTC Link ID Red Hat Product Errata RHSA-2022:7280
errata-xmlrpc 2022-11-02 16:34:35 UTC Link ID Red Hat Product Errata RHSA-2022:7337
errata-xmlrpc 2022-11-02 16:35:09 UTC Link ID Red Hat Product Errata RHSA-2022:7338
errata-xmlrpc 2022-11-02 16:38:10 UTC Link ID Red Hat Product Errata RHSA-2022:7344
errata-xmlrpc 2022-11-07 10:45:54 UTC Link ID Red Hat Product Errata RHBA-2022:7437
errata-xmlrpc 2022-11-08 12:01:24 UTC Link ID Red Hat Product Errata RHBA-2022:7836
errata-xmlrpc 2022-11-09 09:26:46 UTC Link ID Red Hat Product Errata RHBA-2022:7877
errata-xmlrpc 2022-11-09 09:42:35 UTC Link ID Red Hat Product Errata RHSA-2022:7885
errata-xmlrpc 2022-11-09 15:34:46 UTC Link ID Red Hat Product Errata RHBA-2022:7890
Sandro Bonazzola 2022-11-18 15:42:15 UTC CC sbonazzo
Marian Rehak 2022-11-30 19:13:11 UTC Fixed In Version kernel 3.10
Product Security DevOps Team 2022-12-04 06:16:42 UTC Status NEW CLOSED
Resolution --- ERRATA
Last Closed 2022-12-04 06:16:42 UTC
Christian Horn 2023-03-31 01:23:13 UTC CC chorn
Pedro Sampaio 2023-03-31 13:59:02 UTC Depends On 2183526
Joe Lawrence 2023-03-31 14:40:30 UTC CC psampaio
Flags needinfo?(psampaio)
Pedro Sampaio 2023-03-31 16:45:04 UTC Depends On 2183564
Pedro Sampaio 2023-03-31 16:45:41 UTC Flags needinfo?(psampaio)
errata-xmlrpc 2023-07-11 07:52:08 UTC Link ID Red Hat Product Errata RHSA-2023:4022
errata-xmlrpc 2023-07-11 07:52:41 UTC Link ID Red Hat Product Errata RHSA-2023:4023

Back to bug 2114849