Back to bug 1402024

Who When What Removed Added
Adam Mariš 2016-12-06 15:23:32 UTC Blocks 1402027
Norman Sardella 2016-12-08 13:59:34 UTC CC sardella
Wade Mealing 2017-01-12 02:08:33 UTC Whiteboard impact=moderate,public=20120426,reported=20161203,source=oss-security,cvss2=6.9/AV:L/AC:M/Au:N/C:C/I:C/A:C,cvss3=6.7/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H,cwe=CWE-190,rhel-5/kernel=new,rhel-6/kernel=new,rhel-7/kernel=notaffected,rhel-7/kernel-rt=notaffected,mrg-2/realtime-kernel=notaffected,rhelsa-7/arm-kernel=notaffected,fedora-all/kernel=notaffected impact=moderate,public=20120426,reported=20161203,source=oss-security,cvss2=6.9/AV:L/AC:M/Au:N/C:C/I:C/A:C,cvss3=6.7/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H,cwe=CWE-190,rhel-5/kernel=new,rhel-6/kernel=new,rhel-7/kernel=affected,rhel-7/kernel-rt=affected,mrg-2/realtime-kernel=affected,rhelsa-7/arm-kernel=notaffected,fedora-all/kernel=notaffected
Wade Mealing 2017-01-12 05:09:29 UTC CC wmealing
Wade Mealing 2017-01-12 05:31:14 UTC Whiteboard impact=moderate,public=20120426,reported=20161203,source=oss-security,cvss2=6.9/AV:L/AC:M/Au:N/C:C/I:C/A:C,cvss3=6.7/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H,cwe=CWE-190,rhel-5/kernel=new,rhel-6/kernel=new,rhel-7/kernel=affected,rhel-7/kernel-rt=affected,mrg-2/realtime-kernel=affected,rhelsa-7/arm-kernel=notaffected,fedora-all/kernel=notaffected impact=moderate,public=20120426,reported=20161203,source=oss-security,cvss2=6.9/AV:L/AC:M/Au:N/C:C/I:C/A:C,cvss3=6.7/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H,cwe=CWE-190,rhel-5/kernel=notaffected,rhel-6/kernel=notaffected,rhel-7/kernel=affected,rhel-7/kernel-rt=affected,mrg-2/realtime-kernel=affected,rhelsa-7/arm-kernel=notaffected,fedora-all/kernel=notaffected
Wade Mealing 2017-01-12 06:27:38 UTC Doc Text A flaw was found in the Linux kernels implementation of setsockopt for the SO_{SND|RCV}BUF setsockopt() system call. Users with non-namespace CAP_NET_ADMIN are able to trigger this call and create a situation in which the sockets sendbuff data size could be negative.
Wade Mealing 2017-01-12 06:45:07 UTC Doc Text A flaw was found in the Linux kernels implementation of setsockopt for the SO_{SND|RCV}BUF setsockopt() system call. Users with non-namespace CAP_NET_ADMIN are able to trigger this call and create a situation in which the sockets sendbuff data size could be negative. A flaw was found in the Linux kernels implementation of setsockopt for the SO_{SND|RCV}BUF setsockopt() system call. Users with non-namespace CAP_NET_ADMIN are able to trigger this call and create a situation in which the sockets sendbuff data size could be negative.
Wade Mealing 2017-01-12 06:48:10 UTC Depends On 1412478
Wade Mealing 2017-01-12 06:48:22 UTC Depends On 1412479
Wade Mealing 2017-01-12 06:48:35 UTC Depends On 1412480
Wade Mealing 2017-01-12 06:48:41 UTC Depends On 1412481
Wade Mealing 2017-01-12 06:48:49 UTC Depends On 1412482
Eric Christensen 2017-01-12 13:41:14 UTC Doc Text A flaw was found in the Linux kernels implementation of setsockopt for the SO_{SND|RCV}BUF setsockopt() system call. Users with non-namespace CAP_NET_ADMIN are able to trigger this call and create a situation in which the sockets sendbuff data size could be negative. A flaw was found in the Linux kernel's implementation of setsockopt for the SO_{SND|RCV}BUF setsockopt() system call. Users with non-namespace CAP_NET_ADMIN are able to trigger this call and create a situation in which the sockets sendbuff data size could be negative.
Sabrina Dubroca 2017-01-19 12:59:33 UTC CC hsowa, sdubroca
Wade Mealing 2017-02-09 05:35:33 UTC Whiteboard impact=moderate,public=20120426,reported=20161203,source=oss-security,cvss2=6.9/AV:L/AC:M/Au:N/C:C/I:C/A:C,cvss3=6.7/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H,cwe=CWE-190,rhel-5/kernel=notaffected,rhel-6/kernel=notaffected,rhel-7/kernel=affected,rhel-7/kernel-rt=affected,mrg-2/realtime-kernel=affected,rhelsa-7/arm-kernel=notaffected,fedora-all/kernel=notaffected impact=moderate,public=20120426,reported=20161203,source=oss-security,cvss2=6.9/AV:L/AC:M/Au:N/C:C/I:C/A:C,cvss3=6.7/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H,cwe=CWE-190,rhel-5/kernel=notaffected,rhel-6/kernel=notaffected,rhel-7/kernel=not,rhel-7/kernel-rt=notaffected,mrg-2/realtime-kernel=notaffected,rhelsa-7/arm-kernel=notaffected,fedora-all/kernel=notaffected
Tomas Hoger 2017-02-09 11:53:57 UTC Whiteboard impact=moderate,public=20120426,reported=20161203,source=oss-security,cvss2=6.9/AV:L/AC:M/Au:N/C:C/I:C/A:C,cvss3=6.7/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H,cwe=CWE-190,rhel-5/kernel=notaffected,rhel-6/kernel=notaffected,rhel-7/kernel=not,rhel-7/kernel-rt=notaffected,mrg-2/realtime-kernel=notaffected,rhelsa-7/arm-kernel=notaffected,fedora-all/kernel=notaffected impact=moderate,public=20120426,reported=20161203,source=oss-security,cvss2=6.9/AV:L/AC:M/Au:N/C:C/I:C/A:C,cvss3=6.7/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H,cwe=CWE-190,rhel-5/kernel=notaffected,rhel-6/kernel=notaffected,rhel-7/kernel=notaffected,rhel-7/kernel-rt=notaffected,mrg-2/realtime-kernel=notaffected,rhelsa-7/arm-kernel=notaffected,fedora-all/kernel=notaffected
Vladis Dronov 2017-02-09 13:06:59 UTC CC vdronov
Vladis Dronov 2017-02-09 13:07:22 UTC Status NEW CLOSED
Resolution --- NOTABUG
Last Closed 2017-02-09 08:07:22 UTC
Product Security DevOps Team 2019-09-29 14:01:53 UTC Whiteboard impact=moderate,public=20120426,reported=20161203,source=oss-security,cvss2=6.9/AV:L/AC:M/Au:N/C:C/I:C/A:C,cvss3=6.7/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H,cwe=CWE-190,rhel-5/kernel=notaffected,rhel-6/kernel=notaffected,rhel-7/kernel=notaffected,rhel-7/kernel-rt=notaffected,mrg-2/realtime-kernel=notaffected,rhelsa-7/arm-kernel=notaffected,fedora-all/kernel=notaffected

Back to bug 1402024