Back to bug 1317571
| Who | When | What | Removed | Added |
|---|---|---|---|---|
| Adam Mariš | 2016-03-14 15:16:40 UTC | Whiteboard | impact=moderate,public=20150910,reported=20160316,source=cve,cvss2=4.3/AV:N/AC:M/Au:N/C:N/I:P/A:N,rhel-5/kernel=new,rhel-6/kernel=new,rhel-7/kernel=new,rhel-7/kernel-rt=new,mrg-2/realtime-kernel=new,rhelsa-7/arm-kernel=new,fedora-all/kernel=notaffected | impact=moderate,public=20150910,reported=20160312,source=cve,cvss2=4.3/AV:N/AC:M/Au:N/C:N/I:P/A:N,rhel-5/kernel=new,rhel-6/kernel=new,rhel-7/kernel=new,rhel-7/kernel-rt=new,mrg-2/realtime-kernel=new,rhelsa-7/arm-kernel=new,fedora-all/kernel=notaffected |
| Adam Mariš | 2016-03-14 15:26:26 UTC | Blocks | 1317580 | |
| Slawomir Czarko | 2016-03-15 08:58:11 UTC | CC | slawomir | |
| Wade Mealing | 2016-04-15 09:08:55 UTC | Whiteboard | impact=moderate,public=20150910,reported=20160312,source=cve,cvss2=4.3/AV:N/AC:M/Au:N/C:N/I:P/A:N,rhel-5/kernel=new,rhel-6/kernel=new,rhel-7/kernel=new,rhel-7/kernel-rt=new,mrg-2/realtime-kernel=new,rhelsa-7/arm-kernel=new,fedora-all/kernel=notaffected | impact=moderate,public=20150910,reported=20160312,source=cve,cvss2=4.3/AV:N/AC:M/Au:N/C:N/I:P/A:N,rhel-5/kernel=wontfix,rhel-6/kernel=wontfix,rhel-7/kernel=wontfix,rhel-7/kernel-rt=wontfix,mrg-2/realtime-kernel=wontfix,rhelsa-7/arm-kernel=affected,fedora-all/kernel=notaffected |
| Wade Mealing | 2016-04-15 09:31:55 UTC | CC | wmealing | |
| Wade Mealing | 2016-04-15 09:33:12 UTC | Doc Text | The LIST_POISON feature in include/linux/poison.h in the Linux kernel before 4.3 not properly consider the relationship to the mmap_min_addr value, which makes it easier for attackers to bypass a poison-pointer protection mechanism by triggering the use of an uninitialized list entry. | |
| Wade Mealing | 2016-04-18 00:14:09 UTC | Comment 1 is private | 1 | 0 |
| Martin Prpič | 2016-04-22 13:12:52 UTC | Doc Text | The LIST_POISON feature in include/linux/poison.h in the Linux kernel before 4.3 not properly consider the relationship to the mmap_min_addr value, which makes it easier for attackers to bypass a poison-pointer protection mechanism by triggering the use of an uninitialized list entry. | |
| Vladis Dronov | 2016-06-14 21:07:50 UTC | CC | vdronov | |
| Blocks | 1343802 | |||
| John Skeoch | 2016-10-04 04:20:18 UTC | CC | pholasek | |
| PnT Account Manager | 2018-02-07 23:12:36 UTC | CC | agordeev | |
| PnT Account Manager | 2018-07-19 06:15:43 UTC | CC | mguzik | |
| PnT Account Manager | 2018-08-28 22:03:47 UTC | CC | lwang | |
| Eric Sammons | 2019-02-08 14:55:40 UTC | CC | esammons | |
| Product Security DevOps Team | 2019-09-29 13:45:56 UTC | Whiteboard | impact=moderate,public=20150910,reported=20160312,source=cve,cvss2=4.3/AV:N/AC:M/Au:N/C:N/I:P/A:N,rhel-5/kernel=wontfix,rhel-6/kernel=wontfix,rhel-7/kernel=wontfix,rhel-7/kernel-rt=wontfix,mrg-2/realtime-kernel=wontfix,rhelsa-7/arm-kernel=affected,fedora-all/kernel=notaffected | |
| Jeff Fearn 🐞 | 2020-05-07 08:11:12 UTC | CC | arm-mgr | |
| PnT Account Manager | 2020-09-15 19:09:30 UTC | CC | plougher | |
| Red Hat Bugzilla | 2021-03-23 23:40:33 UTC | CC | matt | |
| Red Hat Bugzilla | 2021-05-30 12:35:09 UTC | CC | bhu | |
| Jeff Fearn 🐞 | 2021-06-03 12:02:15 UTC | CC | bhu | |
| Joshua Padman | 2021-10-21 00:51:04 UTC | Status | NEW | CLOSED |
| Resolution | --- | ERRATA | ||
| Last Closed | 2021-10-21 00:51:04 UTC |
Back to bug 1317571