Back to bug 1381911
| Who | When | What | Removed | Added |
|---|---|---|---|---|
| Tomas Hoger | 2016-10-05 11:07:35 UTC | Blocks | 1380288 | |
| Tomas Hoger | 2016-10-05 12:06:39 UTC | Status | NEW | CLOSED |
| Resolution | --- | ERRATA | ||
| Doc Text | A flaw was found in the way systemd handled empty notification messages. A local attacker could use this flaw to make systemd freeze its execution, preventing further management of system services, system shutdown, or zombie process collection via systemd. | |||
| Last Closed | 2016-10-05 08:06:39 UTC | |||
| Slawomir Czarko | 2016-10-05 12:18:09 UTC | CC | slawomir | |
| Terry Bowling | 2016-10-05 20:09:32 UTC | CC | tbowling | |
| Terry Bowling | 2016-10-05 20:10:30 UTC | Link ID | Red Hat Knowledge Base (Solution) 2678711 | |
| Tomas Hoger | 2016-11-09 14:31:12 UTC | CC | ykawada | |
| Depends On | 1393420 | |||
| Product Security DevOps Team | 2019-09-29 13:57:57 UTC | Whiteboard | impact=moderate,public=20160928,reported=20160928,source=oss-security,cvss2=5.6/AV:L/AC:L/Au:N/C:N/I:P/A:C,cvss3=6.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H,cwe=CWE-253,rhel-7/systemd=affected,fedora-all/systemd=notaffected |
Back to bug 1381911