Back to bug 2150863

Who When What Removed Added
Alex 2022-12-05 12:59:35 UTC Depends On 2150864
Alex 2022-12-05 13:35:30 UTC Depends On 2150872, 2150875, 2150874, 2150873
Red Hat Bugzilla 2022-12-31 23:35:56 UTC CC fhrbata
Xin Long 2023-01-04 22:37:36 UTC Depends On 2043822
Xin Long 2023-01-07 17:53:34 UTC Depends On 2043823
Red Hat Bugzilla 2023-04-01 08:41:31 UTC CC dhoward
Red Hat Bugzilla 2023-07-07 08:30:48 UTC Assignee security-response-team nobody
Alex 2023-08-13 21:26:35 UTC Doc Text A flaw use after free due to a race condition in the Linux kernel module sctp_diag was found.
A local user could use this flaw to crash the system or potentially escalate their privileges on the system.
RaTasha Tillery-Smith 2023-08-14 14:19:34 UTC Doc Text A flaw use after free due to a race condition in the Linux kernel module sctp_diag was found.
A local user could use this flaw to crash the system or potentially escalate their privileges on the system.
A use-after-free flaw due to a race condition was found in the Linux kernel’s sctp_diag module. This flaw allows a local user to crash or potentially escalate their privileges on the system.

Back to bug 2150863