Back to bug 1399727

Who When What Removed Added
Adam Mariš 2016-11-29 15:43:55 UTC Blocks 1395238
Adam Mariš 2016-11-30 10:12:34 UTC Summary CVE-2016-7910 kernel: Use after free in sys_ioprio_get() CVE-2016-7910 kernel: Use after free in seq file
Wade Mealing 2017-02-01 08:50:05 UTC CC wmealing
Wade Mealing 2017-02-02 04:56:58 UTC Depends On 1418548
Wade Mealing 2017-02-02 04:57:07 UTC Depends On 1418549
Wade Mealing 2017-02-02 04:57:17 UTC Depends On 1418550
Wade Mealing 2017-02-02 04:57:29 UTC Depends On 1418551
Wade Mealing 2017-02-02 04:57:43 UTC Depends On 1418552
Wade Mealing 2017-02-02 04:57:49 UTC Depends On 1418553
Wade Mealing 2017-02-02 04:57:57 UTC Depends On 1418554
Wade Mealing 2017-02-02 04:58:06 UTC Depends On 1418555
Vladis Dronov 2017-02-09 13:26:40 UTC CC vdronov
Prasad Pandit 2017-03-21 05:12:14 UTC CC prasad
Vladis Dronov 2017-04-06 11:47:49 UTC Doc Text A flaw was found in the Linux kernels implementation of seq_file where an local attacker could create a situation in which an attacker could manipulate memory in which the function pointer to put() could be used for malicious purposes. This could lead to memory corruption and possible privledged escalation.
Doc Type If docs needed, set a value Bug Fix
Eric Christensen 2017-04-06 13:45:10 UTC Doc Text A flaw was found in the Linux kernels implementation of seq_file where an local attacker could create a situation in which an attacker could manipulate memory in which the function pointer to put() could be used for malicious purposes. This could lead to memory corruption and possible privledged escalation. A flaw was found in the Linux kernel's implementation of seq_file where a local attacker could manipulate memory in the put() function pointer. This could lead to memory corruption and possible privileged escalation.
Yasuhiro Ozone 2017-04-07 05:15:08 UTC CC yozone
Dominik Mierzejewski 2017-04-19 08:58:01 UTC CC dominik.mierzejewski
Linda Wang 2017-06-06 18:18:11 UTC Depends On 1459303
PnT Account Manager 2018-02-07 23:21:09 UTC CC agordeev
PnT Account Manager 2018-07-19 06:22:24 UTC CC mguzik
PnT Account Manager 2018-08-28 22:10:13 UTC CC lwang
Eric Sammons 2019-02-08 14:59:10 UTC CC esammons
PnT Account Manager 2019-02-28 22:31:11 UTC CC jkastner
Product Security DevOps Team 2019-06-08 03:02:47 UTC Status NEW CLOSED
Resolution --- ERRATA
Last Closed 2019-06-08 03:02:47 UTC
Product Security DevOps Team 2019-09-29 14:01:53 UTC Whiteboard impact=moderate,public=20160804,reported=20161115,source=internet,cvss2=6.2/AV:L/AC:H/Au:N/C:C/I:C/A:C,cvss3=7.0/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H,cwe=CWE-416,rhel-5/kernel=notaffected,rhel-6/kernel=affected,rhel-7/kernel=affected,rhel-7/kernel-rt=affected,mrg-2/realtime-kernel=affected,rhelsa-7/arm-kernel=affected,fedora-all/kernel=notaffected

Back to bug 1399727