Back to bug 1328478

Who When What Removed Added
Prasad Pandit 2016-04-19 13:32:17 UTC Blocks 1328424
Prasad Pandit 2016-04-19 13:32:39 UTC Depends On 1328479
Prasad Pandit 2016-04-19 13:34:42 UTC Whiteboard impact=important,public=20160317,reported=20160419,source=oss-security,cvss2=7.0/AV:N/AC:M/Au:S/C:N/I:P/A:C,rhel-5/kernel=notaffected,rhel-6/kernel=notaffected,rhel-7/kernel=notaffected,rhel-7/kernel-rt=notaffected,mrg-2/realtime-kernel=notaffected,rhelsa-7/arm-kernel=notaffected,fedora-all/kernel=affected impact=important,public=20160317,reported=20160419,source=oss-security,cvss2=7.0/AV:N/AC:M/Au:S/C:N/I:P/A:C,cwe=CWE-120,rhel-5/kernel=notaffected,rhel-6/kernel=notaffected,rhel-7/kernel=notaffected,rhel-7/kernel-rt=notaffected,mrg-2/realtime-kernel=notaffected,rhelsa-7/arm-kernel=notaffected,fedora-all/kernel=affected
Prasad Pandit 2016-04-19 13:40:09 UTC Doc Text Linux kernel built with the USB over IP(CONFIG_USBIP_*)
support is vulnerable to a buffer overflow issue. It could
occur while receiving USB/IP packets, when the size value
in the packet is greater actual transfer buffer. A user/process could use this flaw to crash the remote host
via kernel memory corruption or potentially execute
arbitrary code.
Martin Prpič 2016-04-22 13:13:09 UTC Doc Text Linux kernel built with the USB over IP(CONFIG_USBIP_*)
support is vulnerable to a buffer overflow issue. It could
occur while receiving USB/IP packets, when the size value
in the packet is greater actual transfer buffer. A user/process could use this flaw to crash the remote host
via kernel memory corruption or potentially execute
arbitrary code.
Slawomir Czarko 2016-07-06 10:04:47 UTC CC slawomir
John Skeoch 2016-10-04 04:20:18 UTC CC pholasek
PnT Account Manager 2018-02-07 23:13:38 UTC CC agordeev
PnT Account Manager 2018-07-19 06:16:35 UTC CC mguzik
PnT Account Manager 2018-08-28 22:04:34 UTC CC lwang
Eric Sammons 2019-02-08 14:58:55 UTC CC esammons
Product Security DevOps Team 2019-06-08 02:50:51 UTC Status NEW CLOSED
Resolution --- NOTABUG
Last Closed 2019-06-08 02:50:51 UTC
Product Security DevOps Team 2019-09-29 13:47:33 UTC Whiteboard impact=important,public=20160317,reported=20160419,source=oss-security,cvss2=7.0/AV:N/AC:M/Au:S/C:N/I:P/A:C,cwe=CWE-120,rhel-5/kernel=notaffected,rhel-6/kernel=notaffected,rhel-7/kernel=notaffected,rhel-7/kernel-rt=notaffected,mrg-2/realtime-kernel=notaffected,rhelsa-7/arm-kernel=notaffected,fedora-all/kernel=affected

Back to bug 1328478