Back to bug 1390832

Who When What Removed Added
Wade Mealing 2016-11-02 03:52:10 UTC CC security-response-team
Wade Mealing 2016-11-02 03:52:14 UTC Blocks 1384811
Wade Mealing 2016-11-02 03:55:06 UTC CC tyrande000
Wade Mealing 2016-11-02 05:55:22 UTC Whiteboard impact=moderate,public=20161212,reported=20161014,source=researcher,cvss2=6.8/AV:L/AC:L/Au:S/C:C/I:C/A:C,cwe=119,fedora-all/kernel=affected impact=moderate,public=20161212,reported=20161014,source=researcher,cvss2=6.8/AV:L/AC:L/Au:S/C:C/I:C/A:C,cwe=119,fedora-all/kernel=affected,rhel-5/kernel=notaffected,rhel-6/kernel=notaffected,rhel-7/kernel=notaffected,rhelsa-7/kernel=notaffected
Wade Mealing 2016-11-02 06:00:41 UTC Doc Text A flaw was found in the TIPC networking subsystem which could allow for memory corruption and possible priveledge escalation. The flaw involves a system with an unusually low MTU (60) on networking devices configured as bearers for the TIPC protocol.

An attacker can create a packet which will overwrite memory outside of allocated space and this can allow for priveledge escalation.
Eric Christensen 2016-11-03 01:08:24 UTC Doc Text A flaw was found in the TIPC networking subsystem which could allow for memory corruption and possible priveledge escalation. The flaw involves a system with an unusually low MTU (60) on networking devices configured as bearers for the TIPC protocol.

An attacker can create a packet which will overwrite memory outside of allocated space and this can allow for priveledge escalation.
A flaw was found in the TIPC networking subsystem which could allow for memory corruption and possible privilege escalation. The flaw involves a system with an unusually low MTU (60) on networking devices configured as bearers for the TIPC protocol. An attacker could create a packet which will overwrite memory outside of allocated space and allow for privilege escalation.
Wade Mealing 2016-11-07 01:07:02 UTC Alias CVE-2016-8632
Wade Mealing 2016-11-07 01:07:31 UTC Summary EMBARGOED kernel: TIPC subsystem: tipc_msg_build() doesn't validate MTU, may cause memory corruption. CVE-2016-8632 kernel: TIPC subsystem: tipc_msg_build() doesn't validate MTU, may cause memory corruption.
Wade Mealing 2016-11-07 02:43:01 UTC Whiteboard impact=moderate,public=20161212,reported=20161014,source=researcher,cvss2=6.8/AV:L/AC:L/Au:S/C:C/I:C/A:C,cwe=119,fedora-all/kernel=affected,rhel-5/kernel=notaffected,rhel-6/kernel=notaffected,rhel-7/kernel=notaffected,rhelsa-7/kernel=notaffected impact=moderate,public=20161107,reported=20161014,source=researcher,cvss2=6.8/AV:L/AC:L/Au:S/C:C/I:C/A:C,cwe=119,fedora-all/kernel=affected,rhel-5/kernel=notaffected,rhel-6/kernel=notaffected,rhel-7/kernel=notaffected,rhelsa-7/kernel=notaffected
Wade Mealing 2016-11-07 02:43:04 UTC Group security, qe_staff
Wade Mealing 2016-11-07 02:56:49 UTC Depends On 1392262
Andrej Nemec 2016-11-08 08:07:48 UTC CC anemec
Whiteboard impact=moderate,public=20161107,reported=20161014,source=researcher,cvss2=6.8/AV:L/AC:L/Au:S/C:C/I:C/A:C,cwe=119,fedora-all/kernel=affected,rhel-5/kernel=notaffected,rhel-6/kernel=notaffected,rhel-7/kernel=notaffected,rhelsa-7/kernel=notaffected impact=moderate,public=20161107,reported=20161014,source=researcher,cvss2=6.8/AV:L/AC:L/Au:S/C:C/I:C/A:C,cwe=CWE-119,fedora-all/kernel=affected,rhel-5/kernel=notaffected,rhel-6/kernel=notaffected,rhel-7/kernel=notaffected,rhelsa-7/kernel=notaffected
Salvatore Bonaccorso 2016-11-08 12:43:53 UTC CC carnil
john.haxby 2016-12-02 13:37:40 UTC CC john.haxby
Vladis Dronov 2016-12-06 15:41:46 UTC CC vdronov
Whiteboard impact=moderate,public=20161107,reported=20161014,source=researcher,cvss2=6.8/AV:L/AC:L/Au:S/C:C/I:C/A:C,cwe=CWE-119,fedora-all/kernel=affected,rhel-5/kernel=notaffected,rhel-6/kernel=notaffected,rhel-7/kernel=notaffected,rhelsa-7/kernel=notaffected impact=moderate,public=20161107,reported=20161014,source=researcher,cvss2=6.8/AV:L/AC:L/Au:S/C:C/I:C/A:C,cwe=CWE-119,rhel-5/kernel=notaffected,rhel-6/kernel=notaffected,rhel-7/kernel=notaffected,rhel-7/kernel-rt=notaffected,mrg-2/realtime-kernel=notaffected,rhelsa-7/arm-kernel=notaffected,fedora-all/kernel=affected
PnT Account Manager 2019-05-02 21:51:57 UTC CC anemec
Product Security DevOps Team 2019-06-08 03:01:46 UTC Status NEW CLOSED
Resolution --- NOTABUG
Last Closed 2019-06-08 03:01:46 UTC
Product Security DevOps Team 2019-09-29 13:59:56 UTC Whiteboard impact=moderate,public=20161107,reported=20161014,source=researcher,cvss2=6.8/AV:L/AC:L/Au:S/C:C/I:C/A:C,cwe=CWE-119,rhel-5/kernel=notaffected,rhel-6/kernel=notaffected,rhel-7/kernel=notaffected,rhel-7/kernel-rt=notaffected,mrg-2/realtime-kernel=notaffected,rhelsa-7/arm-kernel=notaffected,fedora-all/kernel=affected

Back to bug 1390832