Back to bug 1402013

Who When What Removed Added
Adam Mariš 2016-12-06 15:08:21 UTC Depends On 1402014
Adam Mariš 2016-12-06 15:11:06 UTC Blocks 1402019
Adam Mariš 2016-12-06 15:21:51 UTC Fixed In Version kernel 4.9-rc8
Slawomir Czarko 2016-12-07 07:52:04 UTC CC slawomir
Norman Sardella 2016-12-08 13:59:43 UTC CC sardella
Wade Mealing 2016-12-27 04:43:39 UTC CC wmealing
Wade Mealing 2017-01-12 05:40:36 UTC Whiteboard impact=moderate,public=20161202,reported=20161203,source=oss-security,cvss2=6.2/AV:L/AC:H/Au:N/C:C/I:C/A:C,cvss3=6.7/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H,cwe=CWE-190,rhel-5/kernel=new,rhel-6/kernel=new,rhel-7/kernel=new,rhel-7/kernel-rt=new,mrg-2/realtime-kernel=new,rhelsa-7/arm-kernel=new,fedora-all/kernel=affected impact=moderate,public=20161202,reported=20161203,source=oss-security,cvss2=6.9/AV:L/AC:M/Au:N/C:C/I:C/A:C,cvss3=6.7/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H,cwe=CWE-190,rhel-5/kernel=notaffected,rhel-6/kernel=notaffected,rhel-7/kernel=affected,rhel-7/kernel-rt=affected,mrg-2/realtime-kernel=affected,rhelsa-7/arm-kernel=notaffected
Wade Mealing 2017-01-12 06:46:08 UTC Depends On 1412473
Wade Mealing 2017-01-12 06:46:12 UTC Depends On 1412474
Wade Mealing 2017-01-12 06:46:24 UTC Depends On 1412475
Wade Mealing 2017-01-12 06:46:31 UTC Depends On 1412476
Wade Mealing 2017-01-12 06:46:39 UTC Depends On 1412477
Prasad Pandit 2017-03-23 06:26:29 UTC CC prasad
Prasad Pandit 2017-03-31 06:46:19 UTC Doc Text A flaw was found in the Linux kernels implementation of
setsockopt for the SO_{SND|RCV}BUFFORCE setsockopt() system
call. Users with non-namespace CAP_NET_ADMIN are able to
trigger this call and create a situation in which the sockets
sendbuff data size could be negative. This could adversely
affect memory allocations and create situations where the
system could crash or cause memory corruption.
Eric Christensen 2017-03-31 16:42:19 UTC Doc Text A flaw was found in the Linux kernels implementation of
setsockopt for the SO_{SND|RCV}BUFFORCE setsockopt() system
call. Users with non-namespace CAP_NET_ADMIN are able to
trigger this call and create a situation in which the sockets
sendbuff data size could be negative. This could adversely
affect memory allocations and create situations where the
system could crash or cause memory corruption.
A flaw was found in the Linux kernel's implementation of setsockopt for the SO_{SND|RCV}BUFFORCE setsockopt() system call. Users with non-namespace CAP_NET_ADMIN are able to trigger this call and create a situation in which the sockets sendbuff data size could be negative. This could adversely affect memory allocations and create situations where the system could crash or cause memory corruption.
PnT Account Manager 2018-02-07 23:21:59 UTC CC agordeev
PnT Account Manager 2018-07-19 06:23:09 UTC CC mguzik
PnT Account Manager 2018-08-28 22:10:53 UTC CC lwang
Eric Sammons 2019-02-08 15:00:12 UTC CC esammons
PnT Account Manager 2019-02-28 22:31:19 UTC CC jkastner
Product Security DevOps Team 2019-06-08 03:03:23 UTC Status NEW CLOSED
Resolution --- ERRATA
Last Closed 2019-06-08 03:03:23 UTC
Product Security DevOps Team 2019-09-29 14:01:53 UTC Whiteboard impact=moderate,public=20161202,reported=20161203,source=oss-security,cvss2=6.9/AV:L/AC:M/Au:N/C:C/I:C/A:C,cvss3=6.7/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H,cwe=CWE-190,rhel-5/kernel=notaffected,rhel-6/kernel=notaffected,rhel-7/kernel=affected,rhel-7/kernel-rt=affected,mrg-2/realtime-kernel=affected,rhelsa-7/arm-kernel=notaffected

Back to bug 1402013