Back to bug 2150863
| Who | When | What | Removed | Added |
|---|---|---|---|---|
| Alex | 2022-12-05 12:59:35 UTC | Depends On | 2150864 | |
| Alex | 2022-12-05 13:35:30 UTC | Depends On | 2150872, 2150875, 2150874, 2150873 | |
| Red Hat Bugzilla | 2022-12-31 23:35:56 UTC | CC | fhrbata | |
| Xin Long | 2023-01-04 22:37:36 UTC | Depends On | 2043822 | |
| Xin Long | 2023-01-07 17:53:34 UTC | Depends On | 2043823 | |
| Red Hat Bugzilla | 2023-04-01 08:41:31 UTC | CC | dhoward | |
| Red Hat Bugzilla | 2023-07-07 08:30:48 UTC | Assignee | security-response-team | nobody |
| Alex | 2023-08-13 21:26:35 UTC | Doc Text | A flaw use after free due to a race condition in the Linux kernel module sctp_diag was found. A local user could use this flaw to crash the system or potentially escalate their privileges on the system. |
|
| RaTasha Tillery-Smith | 2023-08-14 14:19:34 UTC | Doc Text | A flaw use after free due to a race condition in the Linux kernel module sctp_diag was found. A local user could use this flaw to crash the system or potentially escalate their privileges on the system. | A use-after-free flaw due to a race condition was found in the Linux kernel’s sctp_diag module. This flaw allows a local user to crash or potentially escalate their privileges on the system. |
Back to bug 2150863