Back to bug 1390832
| Who | When | What | Removed | Added |
|---|---|---|---|---|
| Wade Mealing | 2016-11-02 03:52:10 UTC | CC | security-response-team | |
| Wade Mealing | 2016-11-02 03:52:14 UTC | Blocks | 1384811 | |
| Wade Mealing | 2016-11-02 03:55:06 UTC | CC | tyrande000 | |
| Wade Mealing | 2016-11-02 05:55:22 UTC | Whiteboard | impact=moderate,public=20161212,reported=20161014,source=researcher,cvss2=6.8/AV:L/AC:L/Au:S/C:C/I:C/A:C,cwe=119,fedora-all/kernel=affected | impact=moderate,public=20161212,reported=20161014,source=researcher,cvss2=6.8/AV:L/AC:L/Au:S/C:C/I:C/A:C,cwe=119,fedora-all/kernel=affected,rhel-5/kernel=notaffected,rhel-6/kernel=notaffected,rhel-7/kernel=notaffected,rhelsa-7/kernel=notaffected |
| Wade Mealing | 2016-11-02 06:00:41 UTC | Doc Text | A flaw was found in the TIPC networking subsystem which could allow for memory corruption and possible priveledge escalation. The flaw involves a system with an unusually low MTU (60) on networking devices configured as bearers for the TIPC protocol. An attacker can create a packet which will overwrite memory outside of allocated space and this can allow for priveledge escalation. |
|
| Eric Christensen | 2016-11-03 01:08:24 UTC | Doc Text | A flaw was found in the TIPC networking subsystem which could allow for memory corruption and possible priveledge escalation. The flaw involves a system with an unusually low MTU (60) on networking devices configured as bearers for the TIPC protocol. An attacker can create a packet which will overwrite memory outside of allocated space and this can allow for priveledge escalation. | A flaw was found in the TIPC networking subsystem which could allow for memory corruption and possible privilege escalation. The flaw involves a system with an unusually low MTU (60) on networking devices configured as bearers for the TIPC protocol. An attacker could create a packet which will overwrite memory outside of allocated space and allow for privilege escalation. |
| Wade Mealing | 2016-11-07 01:07:02 UTC | Alias | CVE-2016-8632 | |
| Wade Mealing | 2016-11-07 01:07:31 UTC | Summary | EMBARGOED kernel: TIPC subsystem: tipc_msg_build() doesn't validate MTU, may cause memory corruption. | CVE-2016-8632 kernel: TIPC subsystem: tipc_msg_build() doesn't validate MTU, may cause memory corruption. |
| Wade Mealing | 2016-11-07 02:43:01 UTC | Whiteboard | impact=moderate,public=20161212,reported=20161014,source=researcher,cvss2=6.8/AV:L/AC:L/Au:S/C:C/I:C/A:C,cwe=119,fedora-all/kernel=affected,rhel-5/kernel=notaffected,rhel-6/kernel=notaffected,rhel-7/kernel=notaffected,rhelsa-7/kernel=notaffected | impact=moderate,public=20161107,reported=20161014,source=researcher,cvss2=6.8/AV:L/AC:L/Au:S/C:C/I:C/A:C,cwe=119,fedora-all/kernel=affected,rhel-5/kernel=notaffected,rhel-6/kernel=notaffected,rhel-7/kernel=notaffected,rhelsa-7/kernel=notaffected |
| Wade Mealing | 2016-11-07 02:43:04 UTC | Group | security, qe_staff | |
| Wade Mealing | 2016-11-07 02:56:49 UTC | Depends On | 1392262 | |
| Andrej Nemec | 2016-11-08 08:07:48 UTC | CC | anemec | |
| Whiteboard | impact=moderate,public=20161107,reported=20161014,source=researcher,cvss2=6.8/AV:L/AC:L/Au:S/C:C/I:C/A:C,cwe=119,fedora-all/kernel=affected,rhel-5/kernel=notaffected,rhel-6/kernel=notaffected,rhel-7/kernel=notaffected,rhelsa-7/kernel=notaffected | impact=moderate,public=20161107,reported=20161014,source=researcher,cvss2=6.8/AV:L/AC:L/Au:S/C:C/I:C/A:C,cwe=CWE-119,fedora-all/kernel=affected,rhel-5/kernel=notaffected,rhel-6/kernel=notaffected,rhel-7/kernel=notaffected,rhelsa-7/kernel=notaffected | ||
| Salvatore Bonaccorso | 2016-11-08 12:43:53 UTC | CC | carnil | |
| john.haxby | 2016-12-02 13:37:40 UTC | CC | john.haxby | |
| Vladis Dronov | 2016-12-06 15:41:46 UTC | CC | vdronov | |
| Whiteboard | impact=moderate,public=20161107,reported=20161014,source=researcher,cvss2=6.8/AV:L/AC:L/Au:S/C:C/I:C/A:C,cwe=CWE-119,fedora-all/kernel=affected,rhel-5/kernel=notaffected,rhel-6/kernel=notaffected,rhel-7/kernel=notaffected,rhelsa-7/kernel=notaffected | impact=moderate,public=20161107,reported=20161014,source=researcher,cvss2=6.8/AV:L/AC:L/Au:S/C:C/I:C/A:C,cwe=CWE-119,rhel-5/kernel=notaffected,rhel-6/kernel=notaffected,rhel-7/kernel=notaffected,rhel-7/kernel-rt=notaffected,mrg-2/realtime-kernel=notaffected,rhelsa-7/arm-kernel=notaffected,fedora-all/kernel=affected | ||
| PnT Account Manager | 2019-05-02 21:51:57 UTC | CC | anemec | |
| Product Security DevOps Team | 2019-06-08 03:01:46 UTC | Status | NEW | CLOSED |
| Resolution | --- | NOTABUG | ||
| Last Closed | 2019-06-08 03:01:46 UTC | |||
| Product Security DevOps Team | 2019-09-29 13:59:56 UTC | Whiteboard | impact=moderate,public=20161107,reported=20161014,source=researcher,cvss2=6.8/AV:L/AC:L/Au:S/C:C/I:C/A:C,cwe=CWE-119,rhel-5/kernel=notaffected,rhel-6/kernel=notaffected,rhel-7/kernel=notaffected,rhel-7/kernel-rt=notaffected,mrg-2/realtime-kernel=notaffected,rhelsa-7/arm-kernel=notaffected,fedora-all/kernel=affected |
Back to bug 1390832