Back to bug 2132640

Who When What Removed Added
David Arcari 2022-10-06 13:07:56 UTC CC darcari
Alex 2022-10-07 11:02:51 UTC CC ctoe, jpoimboe, kpatch-maint, rhandlin, ycote
Alex 2022-10-07 11:15:11 UTC Comment 3 updated
Alex 2022-10-07 11:19:13 UTC Depends On 2132961
Alex 2022-10-07 11:29:39 UTC Summary kernel: Use after Free in gru_set_context_option leading to kernel panic CVE-2022-3424 kernel: Use after Free in gru_set_context_option leading to kernel panic
Alias CVE-2022-3424
Alex 2022-10-23 18:04:26 UTC Depends On 2137131, 2137134, 2137133, 2137132
Alex 2022-10-23 18:30:16 UTC Doc Text A flaw use after free in the Linux kernel SGI GRU driver was found in the way first gru_file_unlocked_ioctl function being called by user and then fail pass happens in gru_check_chiplet_assignment function. A local user could use this flaw to crash the system or potentially escalate their privileges on the system.
RaTasha Tillery-Smith 2022-10-24 11:37:54 UTC Doc Text A flaw use after free in the Linux kernel SGI GRU driver was found in the way first gru_file_unlocked_ioctl function being called by user and then fail pass happens in gru_check_chiplet_assignment function. A local user could use this flaw to crash the system or potentially escalate their privileges on the system. A use-after-free flaw was found in the Linux kernel’s SGI GRU driver in the way the first gru_file_unlocked_ioctl function is called by the user, where a fail pass occurs in the gru_check_chiplet_assignment function. This flaw allows a local user to crash or potentially escalate their privileges on the system.
zhuoraoyang 2022-10-25 15:33:33 UTC CC alex000young
Sandro Bonazzola 2022-11-18 15:21:36 UTC CC sbonazzo
Red Hat Bugzilla 2022-12-31 23:34:32 UTC CC fhrbata
David Arcari 2023-01-11 15:10:54 UTC Flags needinfo?(allarkin)
Alex 2023-01-11 17:21:11 UTC Flags needinfo?(allarkin)
Pedro Sampaio 2023-03-03 19:27:14 UTC Blocks 2175291
Red Hat Bugzilla 2023-04-01 08:39:35 UTC CC dhoward
Red Hat Bugzilla 2023-07-07 08:31:45 UTC Assignee security-response-team nobody

Back to bug 2132640