Back to bug 2220893
| Who | When | What | Removed | Added |
|---|---|---|---|---|
| TEJ RATHI | 2023-07-06 13:05:28 UTC | CC | acaringi, allarkin, bhu, chwhite, dbohanno, ddepaula, debarbos, dvlasenk, ezulian, hkrzesin, jarod, jdenham, jfaracco, jferlan, jforbes, jlelli, joe.lawrence, jshortt, jstancek, jwyatt, kcarcia, kernel-mgr, ldoskova, lgoncalv, lleshchi, lzampier, nmurray, ptalbert, qzhao, rrobaina, rvrbovsk, rysulliv, scweaver, swood, tglozar, tyberry, walters, wcosta, williams, wmealing, ycote, ymankad | |
| TEJ RATHI | 2023-07-06 13:07:32 UTC | CC | dfreiber, jburrell, rogbas, vkumar | |
| TEJ RATHI | 2023-07-06 13:11:43 UTC | Blocks | 2220897 | |
| TEJ RATHI | 2023-07-07 06:16:47 UTC | Depends On | 2221048, 2221049 | |
| Red Hat Bugzilla | 2023-07-07 08:32:19 UTC | Assignee | security-response-team | nobody |
| Rohit Keshri | 2023-07-10 17:58:22 UTC | Alias | TRIAGE-CVE-2023-31248 | CVE-2023-31248, ZDI-CAN-20717 |
| Summary | TRIAGE-CVE-2023-31248 kernel: nf_tables: use-after-free in nft_chain_lookup_byid() | CVE-2023-31248 CVE-2023-31248 kernel: nf_tables: use-after-free in nft_chain_lookup_byid() | ||
| Rohit Keshri | 2023-07-10 17:58:57 UTC | Severity | medium | high |
| Priority | medium | high | ||
| Summary | CVE-2023-31248 CVE-2023-31248 kernel: nf_tables: use-after-free in nft_chain_lookup_byid() | CVE-2023-31248 kernel: nf_tables: use-after-free in nft_chain_lookup_byid() | ||
| Beth Uptagrafft | 2023-07-10 18:25:32 UTC | Flags | needinfo?(trathi) | |
| Rohit Keshri | 2023-07-10 18:29:49 UTC | CC | jpoimboe, kpatch-maint, rhandlin | |
| Rohit Keshri | 2023-07-10 18:31:57 UTC | Depends On | 2221786, 2221782, 2221778, 2221779, 2221780, 2221781, 2221784, 2221783, 2221785 | |
| Rohit Keshri | 2023-07-10 18:34:23 UTC | Flags | needinfo?(trathi) | |
| Rohit Keshri | 2023-07-10 18:48:09 UTC | Doc Text | A use-after-free flaw was found in the Linux kernel's netfilter module in net/netfilter/nf_tables_api.c in nft_chain_lookup_byid. This flaw could be exploited for Local Privilege Escalation problem by a local attacker due to a missing cleanup. | |
| RaTasha Tillery-Smith | 2023-07-11 14:41:35 UTC | Doc Text | A use-after-free flaw was found in the Linux kernel's netfilter module in net/netfilter/nf_tables_api.c in nft_chain_lookup_byid. This flaw could be exploited for Local Privilege Escalation problem by a local attacker due to a missing cleanup. | A use-after-free flaw was found in the Linux kernel's Netfilter module in net/netfilter/nf_tables_api.c in nft_chain_lookup_byid. This flaw allows a local attacker to cause a local privilege escalation issue due to a missing cleanup. |
Back to bug 2220893