Back to bug 1382268

Who When What Removed Added
Andrej Nemec 2016-10-06 07:54:54 UTC Depends On 1382269
Andrej Nemec 2016-10-06 07:57:14 UTC Blocks 1382270
Slawomir Czarko 2016-10-07 06:39:51 UTC CC slawomir
Mirek Svoboda 2016-10-13 08:04:07 UTC CC goodmirek
Andrej Nemec 2016-10-18 09:26:19 UTC Priority medium high
Whiteboard impact=moderate,public=20160314,reported=20161005,source=suse,cvss2=4.4/AV:L/AC:M/Au:N/C:P/I:P/A:P,cvss3=5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L,cwe=CWE-416,rhel-5/kernel=new,rhel-6/kernel=new,rhel-7/kernel=new,rhel-7/kernel-rt=new,mrg-2/realtime-kernel=new,rhelsa-7/arm-kernel=new,fedora-all/kernel=affected impact=important,public=20160314,reported=20161005,source=suse,cvss2=6.8/AV:N/AC:M/Au:N/C:P/I:P/A:P,cvss3=7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L,cwe=CWE-416,rhel-5/kernel=new,rhel-6/kernel=new,rhel-7/kernel=new,rhel-7/kernel-rt=new,mrg-2/realtime-kernel=new,rhelsa-7/arm-kernel=new,fedora-all/kernel=affected
Severity medium high
Wade Mealing 2016-10-18 11:57:55 UTC CC wmealing
Yasuhiro Ozone 2016-10-19 05:25:41 UTC CC yozone
Tommi Tervo 2016-10-25 11:26:06 UTC CC tommi.tervo
Wade Mealing 2016-10-27 01:43:46 UTC Whiteboard impact=important,public=20160314,reported=20161005,source=suse,cvss2=6.8/AV:N/AC:M/Au:N/C:P/I:P/A:P,cvss3=7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L,cwe=CWE-416,rhel-5/kernel=new,rhel-6/kernel=new,rhel-7/kernel=new,rhel-7/kernel-rt=new,mrg-2/realtime-kernel=new,rhelsa-7/arm-kernel=new,fedora-all/kernel=affected impact=important,public=20160314,reported=20161005,source=suse,cvss2=6.8/AV:N/AC:M/Au:N/C:P/I:P/A:P,cvss3=7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L,cwe=CWE-416,rhel-5/kernel=affected,rhel-6/kernel=affected,rhel-7/kernel=affected,rhel-7/kernel-rt=affected,mrg-2/realtime-kernel=affected,rhelsa-7/arm-kernel=notaffected,fedora-all/kernel=affected
Wade Mealing 2016-10-27 01:52:10 UTC Doc Text A use after free vulnerability was found in the kernels socket recvmmsg subsystem. This may allows remote attackers to corrupt memory and may allow execution of arbitrary code. This corruption takes place during the error handling routines within __sys_recvmmsg() function.
Eric Christensen 2016-10-27 18:28:20 UTC Doc Text A use after free vulnerability was found in the kernels socket recvmmsg subsystem. This may allows remote attackers to corrupt memory and may allow execution of arbitrary code. This corruption takes place during the error handling routines within __sys_recvmmsg() function. A use after free vulnerability was found in the kernels socket recvmmsg subsystem. This may allows remote attackers to corrupt memory and may allow execution of arbitrary code. This corruption takes place during the error handling routines within __sys_recvmmsg() function.
Wade Mealing 2016-10-31 01:45:03 UTC Comment 3 is private 1 0
Wade Mealing 2016-10-31 02:48:40 UTC Depends On 1390044
Wade Mealing 2016-10-31 02:56:19 UTC Depends On 1390046
Wade Mealing 2016-10-31 02:56:53 UTC Depends On 1390047
Wade Mealing 2016-10-31 02:58:49 UTC Depends On 1390048
Wade Mealing 2016-11-02 00:56:15 UTC Depends On 1390805
Wade Mealing 2016-11-02 00:56:27 UTC Depends On 1390806
Wade Mealing 2016-11-02 00:56:39 UTC Depends On 1390807
Wade Mealing 2016-11-02 00:56:46 UTC Depends On 1390808
Mirek Svoboda 2016-11-02 01:05:11 UTC CC goodmirek
Vladis Dronov 2016-11-07 17:41:34 UTC CC vdronov
Kent Engström 2016-11-10 08:16:51 UTC CC kent
ben haubeck 2016-11-10 12:33:32 UTC CC bhaubeck
nucleo 2016-11-10 15:18:23 UTC CC alekcejk
Frederik Ferner 2016-11-11 11:35:33 UTC CC frederik.ferner
Christian Horn 2016-11-24 03:00:15 UTC CC chorn
Christian Horn 2016-11-24 03:00:54 UTC Link ID Red Hat Knowledge Base (Solution) 2775271
Greg Matthews 2016-11-24 17:05:30 UTC CC greg.matthews
suresh kumar 2016-11-24 17:14:17 UTC CC surkumar
Adam Mariš 2016-11-28 10:04:51 UTC Whiteboard impact=important,public=20160314,reported=20161005,source=suse,cvss2=6.8/AV:N/AC:M/Au:N/C:P/I:P/A:P,cvss3=7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L,cwe=CWE-416,rhel-5/kernel=affected,rhel-6/kernel=affected,rhel-7/kernel=affected,rhel-7/kernel-rt=affected,mrg-2/realtime-kernel=affected,rhelsa-7/arm-kernel=notaffected,fedora-all/kernel=affected impact=important,public=20160314,reported=20161005,source=suse,cvss2=6.8/AV:N/AC:M/Au:N/C:P/I:P/A:P,cvss3=7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L,cwe=CWE-416,rhel-5/kernel=affected,rhel-6/kernel=affected,rhel-6.2.z/kernel=affected,rhel-6.4.z/kernel=affected,rhel-6.5.z/kernel=affected,rhel-6.6.z/kernel=affected,rhel-6.7.z/kernel=affected,rhel-7/kernel=affected,rhel-7.1.z/kernel=affected,rhel-7.2.z/kernel=affected,rhel-7/kernel-rt=affected,mrg-2/realtime-kernel=affected,rhelsa-7/arm-kernel=notaffected,fedora-all/kernel=affected
Adam Mariš 2016-11-28 10:07:18 UTC Depends On 1399113
Adam Mariš 2016-11-28 10:07:26 UTC Depends On 1399114
Adam Mariš 2016-11-28 10:07:34 UTC Depends On 1399115
Adam Mariš 2016-11-28 10:07:40 UTC Depends On 1399116
Adam Mariš 2016-11-28 10:07:49 UTC Depends On 1399117
Adam Mariš 2016-11-28 10:07:58 UTC Depends On 1399118
Adam Mariš 2016-11-28 10:08:10 UTC Depends On 1399119
Yoshinori Takahashi 2016-12-06 00:33:19 UTC CC xmu
CC hkim
Petr Matousek 2016-12-06 10:01:59 UTC CC pmatouse
luca moroncelli 2016-12-14 12:35:29 UTC CC lmoroncelli
Eric Christensen 2016-12-19 15:13:41 UTC Doc Text A use after free vulnerability was found in the kernels socket recvmmsg subsystem. This may allows remote attackers to corrupt memory and may allow execution of arbitrary code. This corruption takes place during the error handling routines within __sys_recvmmsg() function. A use-after-free vulnerability was found in the kernels socket recvmmsg subsystem. This may allows remote attackers to corrupt memory and may allow execution of arbitrary code. This corruption takes place during the error handling routines within __sys_recvmmsg() function.
David Zambonini 2016-12-21 11:52:58 UTC CC redhat-e27
Martin Prpič 2017-01-10 08:26:33 UTC Doc Text A use-after-free vulnerability was found in the kernels socket recvmmsg subsystem. This may allows remote attackers to corrupt memory and may allow execution of arbitrary code. This corruption takes place during the error handling routines within __sys_recvmmsg() function. A use-after-free vulnerability was found in the kernels socket recvmmsg subsystem. This may allow remote attackers to corrupt memory and may allow execution of arbitrary code. This corruption takes place during the error handling routines within __sys_recvmmsg() function.
Adam Mariš 2017-01-12 10:56:13 UTC Whiteboard impact=important,public=20160314,reported=20161005,source=suse,cvss2=6.8/AV:N/AC:M/Au:N/C:P/I:P/A:P,cvss3=7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L,cwe=CWE-416,rhel-5/kernel=affected,rhel-6/kernel=affected,rhel-6.2.z/kernel=affected,rhel-6.4.z/kernel=affected,rhel-6.5.z/kernel=affected,rhel-6.6.z/kernel=affected,rhel-6.7.z/kernel=affected,rhel-7/kernel=affected,rhel-7.1.z/kernel=affected,rhel-7.2.z/kernel=affected,rhel-7/kernel-rt=affected,mrg-2/realtime-kernel=affected,rhelsa-7/arm-kernel=notaffected,fedora-all/kernel=affected impact=important,public=20160314,reported=20161005,source=suse,cvss2=7.6/AV:N/AC:H/Au:N/C:C/I:C/A:C,cvss3=8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H,cwe=CWE-416,rhel-5/kernel=affected,rhel-6/kernel=affected,rhel-6.2.z/kernel=affected,rhel-6.4.z/kernel=affected,rhel-6.5.z/kernel=affected,rhel-6.6.z/kernel=affected,rhel-6.7.z/kernel=affected,rhel-7/kernel=affected,rhel-7.1.z/kernel=affected,rhel-7.2.z/kernel=affected,rhel-7/kernel-rt=affected,mrg-2/realtime-kernel=affected,rhelsa-7/arm-kernel=notaffected,fedora-all/kernel=affected
Eric Christensen 2017-01-16 14:47:39 UTC Doc Text A use-after-free vulnerability was found in the kernels socket recvmmsg subsystem. This may allow remote attackers to corrupt memory and may allow execution of arbitrary code. This corruption takes place during the error handling routines within __sys_recvmmsg() function. A use-after-free vulnerability was found in the kernel's socket recvmmsg subsystem. This may allow remote attackers to corrupt memory and may allow execution of arbitrary code. This corruption takes place during the error handling routines within __sys_recvmmsg() function.
Vladis Dronov 2017-02-15 10:58:17 UTC Status NEW CLOSED
Resolution --- ERRATA
Last Closed 2017-02-15 05:58:17 UTC
Vladis Dronov 2017-02-21 01:49:52 UTC Depends On 1425262
Vladis Dronov 2017-02-21 01:56:37 UTC Depends On 1425262
Hidehiko Matsumoto 2017-03-09 10:08:45 UTC CC hmatsumo
Jonathan Maxwell 2017-03-27 04:49:41 UTC CC jmaxwell
Harshula Jayasuriya 2017-03-27 05:01:41 UTC CC harshula
Adam Mariš 2017-09-07 08:53:22 UTC CC amaris
Product Security DevOps Team 2019-09-29 13:57:57 UTC Whiteboard impact=important,public=20160314,reported=20161005,source=suse,cvss2=7.6/AV:N/AC:H/Au:N/C:C/I:C/A:C,cvss3=8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H,cwe=CWE-416,rhel-5/kernel=affected,rhel-6/kernel=affected,rhel-6.2.z/kernel=affected,rhel-6.4.z/kernel=affected,rhel-6.5.z/kernel=affected,rhel-6.6.z/kernel=affected,rhel-6.7.z/kernel=affected,rhel-7/kernel=affected,rhel-7.1.z/kernel=affected,rhel-7.2.z/kernel=affected,rhel-7/kernel-rt=affected,mrg-2/realtime-kernel=affected,rhelsa-7/arm-kernel=notaffected,fedora-all/kernel=affected

Back to bug 1382268