Back to bug 2179000
| Who | When | What | Removed | Added |
|---|---|---|---|---|
| Marian Rehak | 2023-03-16 12:16:02 UTC | Blocks | 2179001 | |
| Rohit Keshri | 2023-03-20 07:31:15 UTC | Severity | high | medium |
| Priority | high | medium | ||
| Rohit Keshri | 2023-03-20 07:46:31 UTC | Fixed In Version | Kernel 6.3 RC2 | |
| Rohit Keshri | 2023-03-20 07:59:02 UTC | CC | jpoimboe, kpatch-maint, rhandlin, ycote | |
| Rohit Keshri | 2023-03-20 08:04:56 UTC | Depends On | 2179823, 2179822, 2179825, 2179821, 2179817, 2179824, 2179820, 2179814, 2179815, 2179816, 2179818, 2179819 | |
| Rohit Keshri | 2023-03-20 08:14:08 UTC | Doc Text | A use-after-free flaw was found in do_tls_getsockopt in net/tls/tls_main.c in Transport Layer Security (TLS) in Network subcompact in the Linux kernel. This flaw could allow an attacker to result in a NULL pointer dereference problem due to a race condition. | |
| RaTasha Tillery-Smith | 2023-03-20 13:26:10 UTC | Doc Text | A use-after-free flaw was found in do_tls_getsockopt in net/tls/tls_main.c in Transport Layer Security (TLS) in Network subcompact in the Linux kernel. This flaw could allow an attacker to result in a NULL pointer dereference problem due to a race condition. | A use-after-free flaw was found in the do_tls_getsockopt function in net/tls/tls_main.c in the Transport Layer Security (TLS) in the Network subcompact in the Linux kernel. This flaw allows an attacker to cause a NULL pointer dereference problem due to a race condition. |
| Kazu Yoshida | 2023-03-30 23:50:43 UTC | CC | kyoshida | |
| Red Hat Bugzilla | 2023-04-01 08:42:05 UTC | CC | dhoward | |
| Rohit Keshri | 2023-04-03 18:35:57 UTC | Depends On | 2184153, 2184152 | |
| Rohit Keshri | 2023-04-19 09:00:55 UTC | Depends On | 2187960, 2187959 | |
| Matus Marhefka | 2023-04-28 11:36:34 UTC | Depends On | 2190423 | |
| Mauro Matteo Cascella | 2023-05-09 09:11:34 UTC | Fixed In Version | Kernel 6.3 RC2 | kernel 6.3-rc2 |
| Rohit Keshri | 2023-05-25 13:37:47 UTC | Depends On | 2210020 | |
| RHEL Program Management Team | 2023-05-29 17:53:16 UTC | Depends On | 2210843 | |
| RHEL Program Management Team | 2023-05-29 17:53:23 UTC | Depends On | 2210844 | |
| RHEL Program Management Team | 2023-05-29 17:53:32 UTC | Depends On | 2210845 | |
| Mauro Matteo Cascella | 2023-06-14 14:04:02 UTC | Summary | CVE-2023-28466 kernel: a race condition in do_tls_getsockopt in net/tls/tls_main.c may lead to use-after-free or NULL pointer dereference | CVE-2023-28466 kernel: tls: race condition in do_tls_getsockopt may lead to use-after-free or NULL pointer dereference |
| errata-xmlrpc | 2023-06-21 14:38:27 UTC | Link ID | Red Hat Product Errata RHSA-2023:3708 | |
| errata-xmlrpc | 2023-06-21 14:39:12 UTC | Link ID | Red Hat Product Errata RHSA-2023:3723 | |
| errata-xmlrpc | 2023-06-27 14:57:56 UTC | Link ID | Red Hat Product Errata RHSA-2023:3819 | |
| errata-xmlrpc | 2023-06-27 14:58:05 UTC | Link ID | Red Hat Product Errata RHSA-2023:3847 | |
| Red Hat Bugzilla | 2023-07-07 08:31:10 UTC | Assignee | security-response-team | nobody |
| Mauro Matteo Cascella | 2023-07-21 10:06:48 UTC | Depends On | 2224519 | |
| Beth Uptagrafft | 2023-07-21 16:37:00 UTC | Flags | needinfo?(mcascell) | |
| CC | mcascell | |||
| Mauro Matteo Cascella | 2023-07-24 12:18:16 UTC | Depends On | 2225153 | |
| Mauro Matteo Cascella | 2023-07-24 12:21:14 UTC | Flags | needinfo?(mcascell) |
Back to bug 2179000