Back to bug 2150845
| Who | When | What | Removed | Added |
|---|---|---|---|---|
| Alex | 2022-12-05 12:06:50 UTC | Depends On | 2150846 | |
| Alex | 2022-12-05 12:07:24 UTC | Depends On | 2150848, 2150847 | |
| Alex | 2022-12-05 12:29:27 UTC | Summary | CVE-2022-20153 kernel: possible use-after-free due to improper locking in rcu_cblist_dequeue of rcu_segcblist.c | CVE-2022-20153 kernel: possible use-after-free due to improper locking in rcu_cblist_dequeue of rcu_segcblist.c |
| Red Hat Bugzilla | 2022-12-31 23:35:43 UTC | CC | fhrbata | |
| Red Hat Bugzilla | 2023-04-01 08:41:11 UTC | CC | dhoward | |
| Red Hat Bugzilla | 2023-07-07 08:34:48 UTC | Assignee | security-response-team | nobody |
| Alex | 2023-08-13 21:39:01 UTC | Doc Text | A flaw use after free in the Linux kernel io_uring (in fs/io_uring.c) was found in the way when improper locking happens. A local user could use this flaw to crash the system or potentially escalate their privileges on the system. |
|
| RaTasha Tillery-Smith | 2023-08-14 14:17:52 UTC | Doc Text | A flaw use after free in the Linux kernel io_uring (in fs/io_uring.c) was found in the way when improper locking happens. A local user could use this flaw to crash the system or potentially escalate their privileges on the system. | A use-after-free flaw was found in the Linux kernel’s io_uring (in fs/io_uring.c) when improper locking happens. This flaw allows a local user to crash or potentially escalate their privileges on the system. |
Back to bug 2150845