Back to bug 1402024
| Who | When | What | Removed | Added |
|---|---|---|---|---|
| Adam Mariš | 2016-12-06 15:23:32 UTC | Blocks | 1402027 | |
| Norman Sardella | 2016-12-08 13:59:34 UTC | CC | sardella | |
| Wade Mealing | 2017-01-12 02:08:33 UTC | Whiteboard | impact=moderate,public=20120426,reported=20161203,source=oss-security,cvss2=6.9/AV:L/AC:M/Au:N/C:C/I:C/A:C,cvss3=6.7/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H,cwe=CWE-190,rhel-5/kernel=new,rhel-6/kernel=new,rhel-7/kernel=notaffected,rhel-7/kernel-rt=notaffected,mrg-2/realtime-kernel=notaffected,rhelsa-7/arm-kernel=notaffected,fedora-all/kernel=notaffected | impact=moderate,public=20120426,reported=20161203,source=oss-security,cvss2=6.9/AV:L/AC:M/Au:N/C:C/I:C/A:C,cvss3=6.7/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H,cwe=CWE-190,rhel-5/kernel=new,rhel-6/kernel=new,rhel-7/kernel=affected,rhel-7/kernel-rt=affected,mrg-2/realtime-kernel=affected,rhelsa-7/arm-kernel=notaffected,fedora-all/kernel=notaffected |
| Wade Mealing | 2017-01-12 05:09:29 UTC | CC | wmealing | |
| Wade Mealing | 2017-01-12 05:31:14 UTC | Whiteboard | impact=moderate,public=20120426,reported=20161203,source=oss-security,cvss2=6.9/AV:L/AC:M/Au:N/C:C/I:C/A:C,cvss3=6.7/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H,cwe=CWE-190,rhel-5/kernel=new,rhel-6/kernel=new,rhel-7/kernel=affected,rhel-7/kernel-rt=affected,mrg-2/realtime-kernel=affected,rhelsa-7/arm-kernel=notaffected,fedora-all/kernel=notaffected | impact=moderate,public=20120426,reported=20161203,source=oss-security,cvss2=6.9/AV:L/AC:M/Au:N/C:C/I:C/A:C,cvss3=6.7/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H,cwe=CWE-190,rhel-5/kernel=notaffected,rhel-6/kernel=notaffected,rhel-7/kernel=affected,rhel-7/kernel-rt=affected,mrg-2/realtime-kernel=affected,rhelsa-7/arm-kernel=notaffected,fedora-all/kernel=notaffected |
| Wade Mealing | 2017-01-12 06:27:38 UTC | Doc Text | A flaw was found in the Linux kernels implementation of setsockopt for the SO_{SND|RCV}BUF setsockopt() system call. Users with non-namespace CAP_NET_ADMIN are able to trigger this call and create a situation in which the sockets sendbuff data size could be negative. | |
| Wade Mealing | 2017-01-12 06:45:07 UTC | Doc Text | A flaw was found in the Linux kernels implementation of setsockopt for the SO_{SND|RCV}BUF setsockopt() system call. Users with non-namespace CAP_NET_ADMIN are able to trigger this call and create a situation in which the sockets sendbuff data size could be negative. | A flaw was found in the Linux kernels implementation of setsockopt for the SO_{SND|RCV}BUF setsockopt() system call. Users with non-namespace CAP_NET_ADMIN are able to trigger this call and create a situation in which the sockets sendbuff data size could be negative. |
| Wade Mealing | 2017-01-12 06:48:10 UTC | Depends On | 1412478 | |
| Wade Mealing | 2017-01-12 06:48:22 UTC | Depends On | 1412479 | |
| Wade Mealing | 2017-01-12 06:48:35 UTC | Depends On | 1412480 | |
| Wade Mealing | 2017-01-12 06:48:41 UTC | Depends On | 1412481 | |
| Wade Mealing | 2017-01-12 06:48:49 UTC | Depends On | 1412482 | |
| Eric Christensen | 2017-01-12 13:41:14 UTC | Doc Text | A flaw was found in the Linux kernels implementation of setsockopt for the SO_{SND|RCV}BUF setsockopt() system call. Users with non-namespace CAP_NET_ADMIN are able to trigger this call and create a situation in which the sockets sendbuff data size could be negative. | A flaw was found in the Linux kernel's implementation of setsockopt for the SO_{SND|RCV}BUF setsockopt() system call. Users with non-namespace CAP_NET_ADMIN are able to trigger this call and create a situation in which the sockets sendbuff data size could be negative. |
| Sabrina Dubroca | 2017-01-19 12:59:33 UTC | CC | hsowa, sdubroca | |
| Wade Mealing | 2017-02-09 05:35:33 UTC | Whiteboard | impact=moderate,public=20120426,reported=20161203,source=oss-security,cvss2=6.9/AV:L/AC:M/Au:N/C:C/I:C/A:C,cvss3=6.7/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H,cwe=CWE-190,rhel-5/kernel=notaffected,rhel-6/kernel=notaffected,rhel-7/kernel=affected,rhel-7/kernel-rt=affected,mrg-2/realtime-kernel=affected,rhelsa-7/arm-kernel=notaffected,fedora-all/kernel=notaffected | impact=moderate,public=20120426,reported=20161203,source=oss-security,cvss2=6.9/AV:L/AC:M/Au:N/C:C/I:C/A:C,cvss3=6.7/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H,cwe=CWE-190,rhel-5/kernel=notaffected,rhel-6/kernel=notaffected,rhel-7/kernel=not,rhel-7/kernel-rt=notaffected,mrg-2/realtime-kernel=notaffected,rhelsa-7/arm-kernel=notaffected,fedora-all/kernel=notaffected |
| Tomas Hoger | 2017-02-09 11:53:57 UTC | Whiteboard | impact=moderate,public=20120426,reported=20161203,source=oss-security,cvss2=6.9/AV:L/AC:M/Au:N/C:C/I:C/A:C,cvss3=6.7/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H,cwe=CWE-190,rhel-5/kernel=notaffected,rhel-6/kernel=notaffected,rhel-7/kernel=not,rhel-7/kernel-rt=notaffected,mrg-2/realtime-kernel=notaffected,rhelsa-7/arm-kernel=notaffected,fedora-all/kernel=notaffected | impact=moderate,public=20120426,reported=20161203,source=oss-security,cvss2=6.9/AV:L/AC:M/Au:N/C:C/I:C/A:C,cvss3=6.7/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H,cwe=CWE-190,rhel-5/kernel=notaffected,rhel-6/kernel=notaffected,rhel-7/kernel=notaffected,rhel-7/kernel-rt=notaffected,mrg-2/realtime-kernel=notaffected,rhelsa-7/arm-kernel=notaffected,fedora-all/kernel=notaffected |
| Vladis Dronov | 2017-02-09 13:06:59 UTC | CC | vdronov | |
| Vladis Dronov | 2017-02-09 13:07:22 UTC | Status | NEW | CLOSED |
| Resolution | --- | NOTABUG | ||
| Last Closed | 2017-02-09 08:07:22 UTC | |||
| Product Security DevOps Team | 2019-09-29 14:01:53 UTC | Whiteboard | impact=moderate,public=20120426,reported=20161203,source=oss-security,cvss2=6.9/AV:L/AC:M/Au:N/C:C/I:C/A:C,cvss3=6.7/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H,cwe=CWE-190,rhel-5/kernel=notaffected,rhel-6/kernel=notaffected,rhel-7/kernel=notaffected,rhel-7/kernel-rt=notaffected,mrg-2/realtime-kernel=notaffected,rhelsa-7/arm-kernel=notaffected,fedora-all/kernel=notaffected |
Back to bug 1402024