Back to bug 2150845

Who When What Removed Added
Alex 2022-12-05 12:06:50 UTC Depends On 2150846
Alex 2022-12-05 12:07:24 UTC Depends On 2150848, 2150847
Alex 2022-12-05 12:29:27 UTC Summary CVE-2022-20153 kernel: possible use-after-free due to improper locking in rcu_cblist_dequeue of rcu_segcblist.c CVE-2022-20153 kernel: possible use-after-free due to improper locking in rcu_cblist_dequeue of rcu_segcblist.c
Red Hat Bugzilla 2022-12-31 23:35:43 UTC CC fhrbata
Red Hat Bugzilla 2023-04-01 08:41:11 UTC CC dhoward
Red Hat Bugzilla 2023-07-07 08:34:48 UTC Assignee security-response-team nobody
Alex 2023-08-13 21:39:01 UTC Doc Text A flaw use after free in the Linux kernel io_uring (in fs/io_uring.c) was found in the way when improper locking happens.
A local user could use this flaw to crash the system or potentially escalate their privileges on the system.
RaTasha Tillery-Smith 2023-08-14 14:17:52 UTC Doc Text A flaw use after free in the Linux kernel io_uring (in fs/io_uring.c) was found in the way when improper locking happens.
A local user could use this flaw to crash the system or potentially escalate their privileges on the system.
A use-after-free flaw was found in the Linux kernel’s io_uring (in fs/io_uring.c) when improper locking happens. This flaw allows a local user to crash or potentially escalate their privileges on the system.

Back to bug 2150845