Back to bug 1399727
| Who | When | What | Removed | Added |
|---|---|---|---|---|
| Adam Mariš | 2016-11-29 15:43:55 UTC | Blocks | 1395238 | |
| Adam Mariš | 2016-11-30 10:12:34 UTC | Summary | CVE-2016-7910 kernel: Use after free in sys_ioprio_get() | CVE-2016-7910 kernel: Use after free in seq file |
| Wade Mealing | 2017-02-01 08:50:05 UTC | CC | wmealing | |
| Wade Mealing | 2017-02-02 04:56:58 UTC | Depends On | 1418548 | |
| Wade Mealing | 2017-02-02 04:57:07 UTC | Depends On | 1418549 | |
| Wade Mealing | 2017-02-02 04:57:17 UTC | Depends On | 1418550 | |
| Wade Mealing | 2017-02-02 04:57:29 UTC | Depends On | 1418551 | |
| Wade Mealing | 2017-02-02 04:57:43 UTC | Depends On | 1418552 | |
| Wade Mealing | 2017-02-02 04:57:49 UTC | Depends On | 1418553 | |
| Wade Mealing | 2017-02-02 04:57:57 UTC | Depends On | 1418554 | |
| Wade Mealing | 2017-02-02 04:58:06 UTC | Depends On | 1418555 | |
| Vladis Dronov | 2017-02-09 13:26:40 UTC | CC | vdronov | |
| Prasad Pandit | 2017-03-21 05:12:14 UTC | CC | prasad | |
| Vladis Dronov | 2017-04-06 11:47:49 UTC | Doc Text | A flaw was found in the Linux kernels implementation of seq_file where an local attacker could create a situation in which an attacker could manipulate memory in which the function pointer to put() could be used for malicious purposes. This could lead to memory corruption and possible privledged escalation. | |
| Doc Type | If docs needed, set a value | Bug Fix | ||
| Eric Christensen | 2017-04-06 13:45:10 UTC | Doc Text | A flaw was found in the Linux kernels implementation of seq_file where an local attacker could create a situation in which an attacker could manipulate memory in which the function pointer to put() could be used for malicious purposes. This could lead to memory corruption and possible privledged escalation. | A flaw was found in the Linux kernel's implementation of seq_file where a local attacker could manipulate memory in the put() function pointer. This could lead to memory corruption and possible privileged escalation. |
| Yasuhiro Ozone | 2017-04-07 05:15:08 UTC | CC | yozone | |
| Dominik Mierzejewski | 2017-04-19 08:58:01 UTC | CC | dominik.mierzejewski | |
| Linda Wang | 2017-06-06 18:18:11 UTC | Depends On | 1459303 | |
| PnT Account Manager | 2018-02-07 23:21:09 UTC | CC | agordeev | |
| PnT Account Manager | 2018-07-19 06:22:24 UTC | CC | mguzik | |
| PnT Account Manager | 2018-08-28 22:10:13 UTC | CC | lwang | |
| Eric Sammons | 2019-02-08 14:59:10 UTC | CC | esammons | |
| PnT Account Manager | 2019-02-28 22:31:11 UTC | CC | jkastner | |
| Product Security DevOps Team | 2019-06-08 03:02:47 UTC | Status | NEW | CLOSED |
| Resolution | --- | ERRATA | ||
| Last Closed | 2019-06-08 03:02:47 UTC | |||
| Product Security DevOps Team | 2019-09-29 14:01:53 UTC | Whiteboard | impact=moderate,public=20160804,reported=20161115,source=internet,cvss2=6.2/AV:L/AC:H/Au:N/C:C/I:C/A:C,cvss3=7.0/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H,cwe=CWE-416,rhel-5/kernel=notaffected,rhel-6/kernel=affected,rhel-7/kernel=affected,rhel-7/kernel-rt=affected,mrg-2/realtime-kernel=affected,rhelsa-7/arm-kernel=affected,fedora-all/kernel=notaffected |
Back to bug 1399727