Back to bug 1402013
| Who | When | What | Removed | Added |
|---|---|---|---|---|
| Adam Mariš | 2016-12-06 15:08:21 UTC | Depends On | 1402014 | |
| Adam Mariš | 2016-12-06 15:11:06 UTC | Blocks | 1402019 | |
| Adam Mariš | 2016-12-06 15:21:51 UTC | Fixed In Version | kernel 4.9-rc8 | |
| Slawomir Czarko | 2016-12-07 07:52:04 UTC | CC | slawomir | |
| Norman Sardella | 2016-12-08 13:59:43 UTC | CC | sardella | |
| Wade Mealing | 2016-12-27 04:43:39 UTC | CC | wmealing | |
| Wade Mealing | 2017-01-12 05:40:36 UTC | Whiteboard | impact=moderate,public=20161202,reported=20161203,source=oss-security,cvss2=6.2/AV:L/AC:H/Au:N/C:C/I:C/A:C,cvss3=6.7/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H,cwe=CWE-190,rhel-5/kernel=new,rhel-6/kernel=new,rhel-7/kernel=new,rhel-7/kernel-rt=new,mrg-2/realtime-kernel=new,rhelsa-7/arm-kernel=new,fedora-all/kernel=affected | impact=moderate,public=20161202,reported=20161203,source=oss-security,cvss2=6.9/AV:L/AC:M/Au:N/C:C/I:C/A:C,cvss3=6.7/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H,cwe=CWE-190,rhel-5/kernel=notaffected,rhel-6/kernel=notaffected,rhel-7/kernel=affected,rhel-7/kernel-rt=affected,mrg-2/realtime-kernel=affected,rhelsa-7/arm-kernel=notaffected |
| Wade Mealing | 2017-01-12 06:46:08 UTC | Depends On | 1412473 | |
| Wade Mealing | 2017-01-12 06:46:12 UTC | Depends On | 1412474 | |
| Wade Mealing | 2017-01-12 06:46:24 UTC | Depends On | 1412475 | |
| Wade Mealing | 2017-01-12 06:46:31 UTC | Depends On | 1412476 | |
| Wade Mealing | 2017-01-12 06:46:39 UTC | Depends On | 1412477 | |
| Prasad Pandit | 2017-03-23 06:26:29 UTC | CC | prasad | |
| Prasad Pandit | 2017-03-31 06:46:19 UTC | Doc Text | A flaw was found in the Linux kernels implementation of setsockopt for the SO_{SND|RCV}BUFFORCE setsockopt() system call. Users with non-namespace CAP_NET_ADMIN are able to trigger this call and create a situation in which the sockets sendbuff data size could be negative. This could adversely affect memory allocations and create situations where the system could crash or cause memory corruption. |
|
| Eric Christensen | 2017-03-31 16:42:19 UTC | Doc Text | A flaw was found in the Linux kernels implementation of setsockopt for the SO_{SND|RCV}BUFFORCE setsockopt() system call. Users with non-namespace CAP_NET_ADMIN are able to trigger this call and create a situation in which the sockets sendbuff data size could be negative. This could adversely affect memory allocations and create situations where the system could crash or cause memory corruption. | A flaw was found in the Linux kernel's implementation of setsockopt for the SO_{SND|RCV}BUFFORCE setsockopt() system call. Users with non-namespace CAP_NET_ADMIN are able to trigger this call and create a situation in which the sockets sendbuff data size could be negative. This could adversely affect memory allocations and create situations where the system could crash or cause memory corruption. |
| PnT Account Manager | 2018-02-07 23:21:59 UTC | CC | agordeev | |
| PnT Account Manager | 2018-07-19 06:23:09 UTC | CC | mguzik | |
| PnT Account Manager | 2018-08-28 22:10:53 UTC | CC | lwang | |
| Eric Sammons | 2019-02-08 15:00:12 UTC | CC | esammons | |
| PnT Account Manager | 2019-02-28 22:31:19 UTC | CC | jkastner | |
| Product Security DevOps Team | 2019-06-08 03:03:23 UTC | Status | NEW | CLOSED |
| Resolution | --- | ERRATA | ||
| Last Closed | 2019-06-08 03:03:23 UTC | |||
| Product Security DevOps Team | 2019-09-29 14:01:53 UTC | Whiteboard | impact=moderate,public=20161202,reported=20161203,source=oss-security,cvss2=6.9/AV:L/AC:M/Au:N/C:C/I:C/A:C,cvss3=6.7/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H,cwe=CWE-190,rhel-5/kernel=notaffected,rhel-6/kernel=notaffected,rhel-7/kernel=affected,rhel-7/kernel-rt=affected,mrg-2/realtime-kernel=affected,rhelsa-7/arm-kernel=notaffected |
Back to bug 1402013