Back to bug 1382268
| Who | When | What | Removed | Added |
|---|---|---|---|---|
| Andrej Nemec | 2016-10-06 07:54:54 UTC | Depends On | 1382269 | |
| Andrej Nemec | 2016-10-06 07:57:14 UTC | Blocks | 1382270 | |
| Slawomir Czarko | 2016-10-07 06:39:51 UTC | CC | slawomir | |
| Mirek Svoboda | 2016-10-13 08:04:07 UTC | CC | goodmirek | |
| Andrej Nemec | 2016-10-18 09:26:19 UTC | Priority | medium | high |
| Whiteboard | impact=moderate,public=20160314,reported=20161005,source=suse,cvss2=4.4/AV:L/AC:M/Au:N/C:P/I:P/A:P,cvss3=5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L,cwe=CWE-416,rhel-5/kernel=new,rhel-6/kernel=new,rhel-7/kernel=new,rhel-7/kernel-rt=new,mrg-2/realtime-kernel=new,rhelsa-7/arm-kernel=new,fedora-all/kernel=affected | impact=important,public=20160314,reported=20161005,source=suse,cvss2=6.8/AV:N/AC:M/Au:N/C:P/I:P/A:P,cvss3=7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L,cwe=CWE-416,rhel-5/kernel=new,rhel-6/kernel=new,rhel-7/kernel=new,rhel-7/kernel-rt=new,mrg-2/realtime-kernel=new,rhelsa-7/arm-kernel=new,fedora-all/kernel=affected | ||
| Severity | medium | high | ||
| Wade Mealing | 2016-10-18 11:57:55 UTC | CC | wmealing | |
| Yasuhiro Ozone | 2016-10-19 05:25:41 UTC | CC | yozone | |
| Tommi Tervo | 2016-10-25 11:26:06 UTC | CC | tommi.tervo | |
| Wade Mealing | 2016-10-27 01:43:46 UTC | Whiteboard | impact=important,public=20160314,reported=20161005,source=suse,cvss2=6.8/AV:N/AC:M/Au:N/C:P/I:P/A:P,cvss3=7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L,cwe=CWE-416,rhel-5/kernel=new,rhel-6/kernel=new,rhel-7/kernel=new,rhel-7/kernel-rt=new,mrg-2/realtime-kernel=new,rhelsa-7/arm-kernel=new,fedora-all/kernel=affected | impact=important,public=20160314,reported=20161005,source=suse,cvss2=6.8/AV:N/AC:M/Au:N/C:P/I:P/A:P,cvss3=7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L,cwe=CWE-416,rhel-5/kernel=affected,rhel-6/kernel=affected,rhel-7/kernel=affected,rhel-7/kernel-rt=affected,mrg-2/realtime-kernel=affected,rhelsa-7/arm-kernel=notaffected,fedora-all/kernel=affected |
| Wade Mealing | 2016-10-27 01:52:10 UTC | Doc Text | A use after free vulnerability was found in the kernels socket recvmmsg subsystem. This may allows remote attackers to corrupt memory and may allow execution of arbitrary code. This corruption takes place during the error handling routines within __sys_recvmmsg() function. | |
| Eric Christensen | 2016-10-27 18:28:20 UTC | Doc Text | A use after free vulnerability was found in the kernels socket recvmmsg subsystem. This may allows remote attackers to corrupt memory and may allow execution of arbitrary code. This corruption takes place during the error handling routines within __sys_recvmmsg() function. | A use after free vulnerability was found in the kernels socket recvmmsg subsystem. This may allows remote attackers to corrupt memory and may allow execution of arbitrary code. This corruption takes place during the error handling routines within __sys_recvmmsg() function. |
| Wade Mealing | 2016-10-31 01:45:03 UTC | Comment 3 is private | 1 | 0 |
| Wade Mealing | 2016-10-31 02:48:40 UTC | Depends On | 1390044 | |
| Wade Mealing | 2016-10-31 02:56:19 UTC | Depends On | 1390046 | |
| Wade Mealing | 2016-10-31 02:56:53 UTC | Depends On | 1390047 | |
| Wade Mealing | 2016-10-31 02:58:49 UTC | Depends On | 1390048 | |
| Wade Mealing | 2016-11-02 00:56:15 UTC | Depends On | 1390805 | |
| Wade Mealing | 2016-11-02 00:56:27 UTC | Depends On | 1390806 | |
| Wade Mealing | 2016-11-02 00:56:39 UTC | Depends On | 1390807 | |
| Wade Mealing | 2016-11-02 00:56:46 UTC | Depends On | 1390808 | |
| Mirek Svoboda | 2016-11-02 01:05:11 UTC | CC | goodmirek | |
| Vladis Dronov | 2016-11-07 17:41:34 UTC | CC | vdronov | |
| Kent Engström | 2016-11-10 08:16:51 UTC | CC | kent | |
| ben haubeck | 2016-11-10 12:33:32 UTC | CC | bhaubeck | |
| nucleo | 2016-11-10 15:18:23 UTC | CC | alekcejk | |
| Frederik Ferner | 2016-11-11 11:35:33 UTC | CC | frederik.ferner | |
| Christian Horn | 2016-11-24 03:00:15 UTC | CC | chorn | |
| Christian Horn | 2016-11-24 03:00:54 UTC | Link ID | Red Hat Knowledge Base (Solution) 2775271 | |
| Greg Matthews | 2016-11-24 17:05:30 UTC | CC | greg.matthews | |
| suresh kumar | 2016-11-24 17:14:17 UTC | CC | surkumar | |
| Adam Mariš | 2016-11-28 10:04:51 UTC | Whiteboard | impact=important,public=20160314,reported=20161005,source=suse,cvss2=6.8/AV:N/AC:M/Au:N/C:P/I:P/A:P,cvss3=7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L,cwe=CWE-416,rhel-5/kernel=affected,rhel-6/kernel=affected,rhel-7/kernel=affected,rhel-7/kernel-rt=affected,mrg-2/realtime-kernel=affected,rhelsa-7/arm-kernel=notaffected,fedora-all/kernel=affected | impact=important,public=20160314,reported=20161005,source=suse,cvss2=6.8/AV:N/AC:M/Au:N/C:P/I:P/A:P,cvss3=7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L,cwe=CWE-416,rhel-5/kernel=affected,rhel-6/kernel=affected,rhel-6.2.z/kernel=affected,rhel-6.4.z/kernel=affected,rhel-6.5.z/kernel=affected,rhel-6.6.z/kernel=affected,rhel-6.7.z/kernel=affected,rhel-7/kernel=affected,rhel-7.1.z/kernel=affected,rhel-7.2.z/kernel=affected,rhel-7/kernel-rt=affected,mrg-2/realtime-kernel=affected,rhelsa-7/arm-kernel=notaffected,fedora-all/kernel=affected |
| Adam Mariš | 2016-11-28 10:07:18 UTC | Depends On | 1399113 | |
| Adam Mariš | 2016-11-28 10:07:26 UTC | Depends On | 1399114 | |
| Adam Mariš | 2016-11-28 10:07:34 UTC | Depends On | 1399115 | |
| Adam Mariš | 2016-11-28 10:07:40 UTC | Depends On | 1399116 | |
| Adam Mariš | 2016-11-28 10:07:49 UTC | Depends On | 1399117 | |
| Adam Mariš | 2016-11-28 10:07:58 UTC | Depends On | 1399118 | |
| Adam Mariš | 2016-11-28 10:08:10 UTC | Depends On | 1399119 | |
| Yoshinori Takahashi | 2016-12-06 00:33:19 UTC | CC | xmu | |
| CC | hkim | |||
| Petr Matousek | 2016-12-06 10:01:59 UTC | CC | pmatouse | |
| luca moroncelli | 2016-12-14 12:35:29 UTC | CC | lmoroncelli | |
| Eric Christensen | 2016-12-19 15:13:41 UTC | Doc Text | A use after free vulnerability was found in the kernels socket recvmmsg subsystem. This may allows remote attackers to corrupt memory and may allow execution of arbitrary code. This corruption takes place during the error handling routines within __sys_recvmmsg() function. | A use-after-free vulnerability was found in the kernels socket recvmmsg subsystem. This may allows remote attackers to corrupt memory and may allow execution of arbitrary code. This corruption takes place during the error handling routines within __sys_recvmmsg() function. |
| David Zambonini | 2016-12-21 11:52:58 UTC | CC | redhat-e27 | |
| Martin Prpič | 2017-01-10 08:26:33 UTC | Doc Text | A use-after-free vulnerability was found in the kernels socket recvmmsg subsystem. This may allows remote attackers to corrupt memory and may allow execution of arbitrary code. This corruption takes place during the error handling routines within __sys_recvmmsg() function. | A use-after-free vulnerability was found in the kernels socket recvmmsg subsystem. This may allow remote attackers to corrupt memory and may allow execution of arbitrary code. This corruption takes place during the error handling routines within __sys_recvmmsg() function. |
| Adam Mariš | 2017-01-12 10:56:13 UTC | Whiteboard | impact=important,public=20160314,reported=20161005,source=suse,cvss2=6.8/AV:N/AC:M/Au:N/C:P/I:P/A:P,cvss3=7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L,cwe=CWE-416,rhel-5/kernel=affected,rhel-6/kernel=affected,rhel-6.2.z/kernel=affected,rhel-6.4.z/kernel=affected,rhel-6.5.z/kernel=affected,rhel-6.6.z/kernel=affected,rhel-6.7.z/kernel=affected,rhel-7/kernel=affected,rhel-7.1.z/kernel=affected,rhel-7.2.z/kernel=affected,rhel-7/kernel-rt=affected,mrg-2/realtime-kernel=affected,rhelsa-7/arm-kernel=notaffected,fedora-all/kernel=affected | impact=important,public=20160314,reported=20161005,source=suse,cvss2=7.6/AV:N/AC:H/Au:N/C:C/I:C/A:C,cvss3=8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H,cwe=CWE-416,rhel-5/kernel=affected,rhel-6/kernel=affected,rhel-6.2.z/kernel=affected,rhel-6.4.z/kernel=affected,rhel-6.5.z/kernel=affected,rhel-6.6.z/kernel=affected,rhel-6.7.z/kernel=affected,rhel-7/kernel=affected,rhel-7.1.z/kernel=affected,rhel-7.2.z/kernel=affected,rhel-7/kernel-rt=affected,mrg-2/realtime-kernel=affected,rhelsa-7/arm-kernel=notaffected,fedora-all/kernel=affected |
| Eric Christensen | 2017-01-16 14:47:39 UTC | Doc Text | A use-after-free vulnerability was found in the kernels socket recvmmsg subsystem. This may allow remote attackers to corrupt memory and may allow execution of arbitrary code. This corruption takes place during the error handling routines within __sys_recvmmsg() function. | A use-after-free vulnerability was found in the kernel's socket recvmmsg subsystem. This may allow remote attackers to corrupt memory and may allow execution of arbitrary code. This corruption takes place during the error handling routines within __sys_recvmmsg() function. |
| Vladis Dronov | 2017-02-15 10:58:17 UTC | Status | NEW | CLOSED |
| Resolution | --- | ERRATA | ||
| Last Closed | 2017-02-15 05:58:17 UTC | |||
| Vladis Dronov | 2017-02-21 01:49:52 UTC | Depends On | 1425262 | |
| Vladis Dronov | 2017-02-21 01:56:37 UTC | Depends On | 1425262 | |
| Hidehiko Matsumoto | 2017-03-09 10:08:45 UTC | CC | hmatsumo | |
| Jonathan Maxwell | 2017-03-27 04:49:41 UTC | CC | jmaxwell | |
| Harshula Jayasuriya | 2017-03-27 05:01:41 UTC | CC | harshula | |
| Adam Mariš | 2017-09-07 08:53:22 UTC | CC | amaris | |
| Product Security DevOps Team | 2019-09-29 13:57:57 UTC | Whiteboard | impact=important,public=20160314,reported=20161005,source=suse,cvss2=7.6/AV:N/AC:H/Au:N/C:C/I:C/A:C,cvss3=8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H,cwe=CWE-416,rhel-5/kernel=affected,rhel-6/kernel=affected,rhel-6.2.z/kernel=affected,rhel-6.4.z/kernel=affected,rhel-6.5.z/kernel=affected,rhel-6.6.z/kernel=affected,rhel-6.7.z/kernel=affected,rhel-7/kernel=affected,rhel-7.1.z/kernel=affected,rhel-7.2.z/kernel=affected,rhel-7/kernel-rt=affected,mrg-2/realtime-kernel=affected,rhelsa-7/arm-kernel=notaffected,fedora-all/kernel=affected |
Back to bug 1382268