Back to bug 1328478
| Who | When | What | Removed | Added |
|---|---|---|---|---|
| Prasad Pandit | 2016-04-19 13:32:17 UTC | Blocks | 1328424 | |
| Prasad Pandit | 2016-04-19 13:32:39 UTC | Depends On | 1328479 | |
| Prasad Pandit | 2016-04-19 13:34:42 UTC | Whiteboard | impact=important,public=20160317,reported=20160419,source=oss-security,cvss2=7.0/AV:N/AC:M/Au:S/C:N/I:P/A:C,rhel-5/kernel=notaffected,rhel-6/kernel=notaffected,rhel-7/kernel=notaffected,rhel-7/kernel-rt=notaffected,mrg-2/realtime-kernel=notaffected,rhelsa-7/arm-kernel=notaffected,fedora-all/kernel=affected | impact=important,public=20160317,reported=20160419,source=oss-security,cvss2=7.0/AV:N/AC:M/Au:S/C:N/I:P/A:C,cwe=CWE-120,rhel-5/kernel=notaffected,rhel-6/kernel=notaffected,rhel-7/kernel=notaffected,rhel-7/kernel-rt=notaffected,mrg-2/realtime-kernel=notaffected,rhelsa-7/arm-kernel=notaffected,fedora-all/kernel=affected |
| Prasad Pandit | 2016-04-19 13:40:09 UTC | Doc Text | Linux kernel built with the USB over IP(CONFIG_USBIP_*) support is vulnerable to a buffer overflow issue. It could occur while receiving USB/IP packets, when the size value in the packet is greater actual transfer buffer. A user/process could use this flaw to crash the remote host via kernel memory corruption or potentially execute arbitrary code. |
|
| Martin Prpič | 2016-04-22 13:13:09 UTC | Doc Text | Linux kernel built with the USB over IP(CONFIG_USBIP_*) support is vulnerable to a buffer overflow issue. It could occur while receiving USB/IP packets, when the size value in the packet is greater actual transfer buffer. A user/process could use this flaw to crash the remote host via kernel memory corruption or potentially execute arbitrary code. | |
| Slawomir Czarko | 2016-07-06 10:04:47 UTC | CC | slawomir | |
| John Skeoch | 2016-10-04 04:20:18 UTC | CC | pholasek | |
| PnT Account Manager | 2018-02-07 23:13:38 UTC | CC | agordeev | |
| PnT Account Manager | 2018-07-19 06:16:35 UTC | CC | mguzik | |
| PnT Account Manager | 2018-08-28 22:04:34 UTC | CC | lwang | |
| Eric Sammons | 2019-02-08 14:58:55 UTC | CC | esammons | |
| Product Security DevOps Team | 2019-06-08 02:50:51 UTC | Status | NEW | CLOSED |
| Resolution | --- | NOTABUG | ||
| Last Closed | 2019-06-08 02:50:51 UTC | |||
| Product Security DevOps Team | 2019-09-29 13:47:33 UTC | Whiteboard | impact=important,public=20160317,reported=20160419,source=oss-security,cvss2=7.0/AV:N/AC:M/Au:S/C:N/I:P/A:C,cwe=CWE-120,rhel-5/kernel=notaffected,rhel-6/kernel=notaffected,rhel-7/kernel=notaffected,rhel-7/kernel-rt=notaffected,mrg-2/realtime-kernel=notaffected,rhelsa-7/arm-kernel=notaffected,fedora-all/kernel=affected |
Back to bug 1328478