Back to bug 1383972
| Who | When | What | Removed | Added |
|---|---|---|---|---|
| Andrej Nemec | 2016-10-12 09:32:33 UTC | Depends On | 1383973 | |
| Andrej Nemec | 2016-10-12 09:32:46 UTC | Depends On | 1383974 | |
| Andrej Nemec | 2016-10-12 09:32:58 UTC | Depends On | 1383975 | |
| Andrej Nemec | 2016-10-12 09:35:43 UTC | Blocks | 1383977 | |
| Doran Moppert | 2016-12-15 06:50:21 UTC | Whiteboard | impact=moderate,public=20161011,reported=20161011,source=oss-security,cvss2=5.1/AV:N/AC:H/Au:N/C:P/I:P/A:P,cvss3=8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H,fedora-all/guile=affected,fedora-all/compat-guile18=affected,epel-7/compat-guile18=affected,rhel-5/guile=new,rhel-6/guile=new | impact=moderate,public=20161011,reported=20161011,source=oss-security,cvss2=5.1/AV:N/AC:H/Au:N/C:P/I:P/A:P,cvss3=8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H,fedora-all/guile=affected,fedora-all/compat-guile18=notaffected,epel-7/compat-guile18=notaffected,rhel-5/guile=notaffected,rhel-6/guile=notaffected,rhel-7/guile=affected |
| Doran Moppert | 2016-12-16 04:42:21 UTC | Whiteboard | impact=moderate,public=20161011,reported=20161011,source=oss-security,cvss2=5.1/AV:N/AC:H/Au:N/C:P/I:P/A:P,cvss3=8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H,fedora-all/guile=affected,fedora-all/compat-guile18=notaffected,epel-7/compat-guile18=notaffected,rhel-5/guile=notaffected,rhel-6/guile=notaffected,rhel-7/guile=affected | impact=moderate,public=20161011,reported=20161011,source=oss-security,cvss2=5.1/AV:N/AC:H/Au:N/C:P/I:P/A:P,cvss3=8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H,fedora-all/guile=affected,fedora-all/compat-guile18=notaffected,epel-7/compat-guile18=notaffected,rhel-5/guile=notaffected,rhel-6/guile=notaffected,rhel-7/guile=affected |
| Doran Moppert | 2016-12-16 05:03:08 UTC | Doc Text | A vulnerability was found in guile's REPL server (--listen), making it vulnerable to HTTP inter-protocol attacks. A crafted website, when visited by a developer with an instance of the REPL server, could cause arbitrary code execution within the guile scheme interpreter. | |
| Doran Moppert | 2016-12-16 05:04:24 UTC | Whiteboard | impact=moderate,public=20161011,reported=20161011,source=oss-security,cvss2=5.1/AV:N/AC:H/Au:N/C:P/I:P/A:P,cvss3=8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H,fedora-all/guile=affected,fedora-all/compat-guile18=notaffected,epel-7/compat-guile18=notaffected,rhel-5/guile=notaffected,rhel-6/guile=notaffected,rhel-7/guile=affected | impact=moderate,public=20161011,reported=20161011,source=oss-security,cvss2=5.1/AV:N/AC:H/Au:N/C:P/I:P/A:P,cvss3=8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H,fedora-all/guile=affected,fedora-all/compat-guile18=notaffected,epel-7/compat-guile18=notaffected,rhel-5/guile=notaffected,rhel-6/guile=notaffected,rhel-7/guile=wontfix |
| Doran Moppert | 2016-12-16 05:05:10 UTC | Status | NEW | CLOSED |
| Resolution | --- | WONTFIX | ||
| Last Closed | 2016-12-16 00:05:10 UTC | |||
| Product Security DevOps Team | 2019-09-29 13:57:57 UTC | Whiteboard | impact=moderate,public=20161011,reported=20161011,source=oss-security,cvss2=5.1/AV:N/AC:H/Au:N/C:P/I:P/A:P,cvss3=8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H,fedora-all/guile=affected,fedora-all/compat-guile18=notaffected,epel-7/compat-guile18=notaffected,rhel-5/guile=notaffected,rhel-6/guile=notaffected,rhel-7/guile=wontfix |
Back to bug 1383972