CVE 2016-0774
The (1) pipe_read and (2) pipe_write implementations in fs/pipe.c in a certain Linux kernel backport in the linux package before 3.2.73-2+deb7u3 on Debian wheezy and the kernel package before 3.10.0-229.26.2 on Red Hat Enterprise Linux (RHEL) 7.1 do not properly consider the side effects of failed __copy_
Related bugs and status
CVE-2016-0774 (Candidate) is related to these bugs:
Bug #1563911: Precise update to 3.2.77 stable release
Summary | In | Importance | Status | |||
---|---|---|---|---|---|---|
1563911 | Precise update to 3.2.77 stable release | linux (Ubuntu) | Undecided | Invalid | ||
1563911 | Precise update to 3.2.77 stable release | linux (Ubuntu Precise) | Undecided | Fix Released |
Bug #1563914: Precise update to 3.2.78 stable release
Summary | In | Importance | Status | |||
---|---|---|---|---|---|---|
1563914 | Precise update to 3.2.78 stable release | linux (Ubuntu) | Undecided | Invalid | ||
1563914 | Precise update to 3.2.78 stable release | linux (Ubuntu Precise) | Undecided | Fix Released |
Bug #1563916: CVE-2016-0774
Summary | In | Importance | Status | |||
---|---|---|---|---|---|---|
1563916 | CVE-2016-0774 | linux (Ubuntu) | Medium | Invalid | ||
1563916 | CVE-2016-0774 | linux-ti-omap4 (Ubuntu) | Medium | Invalid | ||
1563916 | CVE-2016-0774 | linux-raspi2 (Ubuntu) | Medium | Invalid | ||
1563916 | CVE-2016-0774 | linux (Ubuntu Xenial) | Medium | Invalid | ||
1563916 | CVE-2016-0774 | linux-raspi2 (Ubuntu Xenial) | Medium | Invalid | ||
1563916 | CVE-2016-0774 | linux-ti-omap4 (Ubuntu Xenial) | Medium | Invalid | ||
1563916 | CVE-2016-0774 | linux (Ubuntu Wily) | Medium | Invalid | ||
1563916 | CVE-2016-0774 | linux-raspi2 (Ubuntu Wily) | Medium | Invalid | ||
1563916 | CVE-2016-0774 | linux-ti-omap4 (Ubuntu Wily) | Medium | Invalid | ||
1563916 | CVE-2016-0774 | linux (Ubuntu Vivid) | Undecided | Won't Fix | ||
1563916 | CVE-2016-0774 | linux-raspi2 (Ubuntu Vivid) | Undecided | Won't Fix | ||
1563916 | CVE-2016-0774 | linux-ti-omap4 (Ubuntu Vivid) | Undecided | Won't Fix | ||
1563916 | CVE-2016-0774 | linux (Ubuntu Trusty) | Medium | Fix Released | ||
1563916 | CVE-2016-0774 | linux-raspi2 (Ubuntu Trusty) | Medium | Invalid | ||
1563916 | CVE-2016-0774 | linux-ti-omap4 (Ubuntu Trusty) | Medium | Invalid | ||
1563916 | CVE-2016-0774 | linux (Ubuntu Precise) | Medium | Fix Released | ||
1563916 | CVE-2016-0774 | linux-raspi2 (Ubuntu Precise) | Medium | Invalid | ||
1563916 | CVE-2016-0774 | linux-ti-omap4 (Ubuntu Precise) | Medium | Fix Released | ||
1563916 | CVE-2016-0774 | linux-lts-trusty (Ubuntu) | Medium | Invalid | ||
1563916 | CVE-2016-0774 | linux-lts-trusty (Ubuntu Precise) | Medium | Fix Released | ||
1563916 | CVE-2016-0774 | linux-lts-trusty (Ubuntu Trusty) | Medium | Invalid | ||
1563916 | CVE-2016-0774 | linux-lts-trusty (Ubuntu Vivid) | Undecided | Won't Fix | ||
1563916 | CVE-2016-0774 | linux-lts-trusty (Ubuntu Wily) | Medium | Invalid | ||
1563916 | CVE-2016-0774 | linux-lts-trusty (Ubuntu Xenial) | Medium | Invalid | ||
1563916 | CVE-2016-0774 | linux-armadaxp (Ubuntu) | Medium | Invalid | ||
1563916 | CVE-2016-0774 | linux-armadaxp (Ubuntu Precise) | Medium | Fix Released | ||
1563916 | CVE-2016-0774 | linux-armadaxp (Ubuntu Trusty) | Medium | Invalid | ||
1563916 | CVE-2016-0774 | linux-armadaxp (Ubuntu Vivid) | Undecided | Won't Fix | ||
1563916 | CVE-2016-0774 | linux-armadaxp (Ubuntu Wily) | Medium | Invalid | ||
1563916 | CVE-2016-0774 | linux-armadaxp (Ubuntu Xenial) | Medium | Invalid | ||
1563916 | CVE-2016-0774 | linux-lts-xenial (Ubuntu) | Medium | Invalid | ||
1563916 | CVE-2016-0774 | linux-lts-xenial (Ubuntu Precise) | Medium | Invalid | ||
1563916 | CVE-2016-0774 | linux-lts-xenial (Ubuntu Trusty) | Medium | Invalid | ||
1563916 | CVE-2016-0774 | linux-lts-xenial (Ubuntu Vivid) | Undecided | New | ||
1563916 | CVE-2016-0774 | linux-lts-xenial (Ubuntu Wily) | Medium | Invalid | ||
1563916 | CVE-2016-0774 | linux-lts-xenial (Ubuntu Xenial) | Medium | Invalid | ||
1563916 | CVE-2016-0774 | linux-lts-wily (Ubuntu) | Medium | Invalid | ||
1563916 | CVE-2016-0774 | linux-lts-wily (Ubuntu Precise) | Medium | Invalid | ||
1563916 | CVE-2016-0774 | linux-lts-wily (Ubuntu Trusty) | Medium | Invalid | ||
1563916 | CVE-2016-0774 | linux-lts-wily (Ubuntu Vivid) | Undecided | New | ||
1563916 | CVE-2016-0774 | linux-lts-wily (Ubuntu Wily) | Medium | Invalid | ||
1563916 | CVE-2016-0774 | linux-lts-wily (Ubuntu Xenial) | Medium | Invalid | ||
1563916 | CVE-2016-0774 | linux-goldfish (Ubuntu) | Medium | New | ||
1563916 | CVE-2016-0774 | linux-goldfish (Ubuntu Precise) | Medium | Invalid | ||
1563916 | CVE-2016-0774 | linux-goldfish (Ubuntu Trusty) | Medium | Invalid | ||
1563916 | CVE-2016-0774 | linux-goldfish (Ubuntu Vivid) | Undecided | New | ||
1563916 | CVE-2016-0774 | linux-goldfish (Ubuntu Wily) | Medium | New | ||
1563916 | CVE-2016-0774 | linux-goldfish (Ubuntu Xenial) | Medium | New | ||
1563916 | CVE-2016-0774 | linux-lts-saucy (Ubuntu) | Medium | Invalid | ||
1563916 | CVE-2016-0774 | linux-lts-saucy (Ubuntu Precise) | Medium | Invalid | ||
1563916 | CVE-2016-0774 | linux-lts-saucy (Ubuntu Trusty) | Medium | Invalid | ||
1563916 | CVE-2016-0774 | linux-lts-saucy (Ubuntu Vivid) | Undecided | Won't Fix | ||
1563916 | CVE-2016-0774 | linux-lts-saucy (Ubuntu Wily) | Medium | Invalid | ||
1563916 | CVE-2016-0774 | linux-lts-saucy (Ubuntu Xenial) | Medium | Invalid | ||
1563916 | CVE-2016-0774 | linux-lts-quantal (Ubuntu) | Medium | Invalid | ||
1563916 | CVE-2016-0774 | linux-lts-quantal (Ubuntu Precise) | Medium | Invalid | ||
1563916 | CVE-2016-0774 | linux-lts-quantal (Ubuntu Trusty) | Medium | Invalid | ||
1563916 | CVE-2016-0774 | linux-lts-quantal (Ubuntu Vivid) | Undecided | Won't Fix | ||
1563916 | CVE-2016-0774 | linux-lts-quantal (Ubuntu Wily) | Medium | Invalid | ||
1563916 | CVE-2016-0774 | linux-lts-quantal (Ubuntu Xenial) | Medium | Invalid | ||
1563916 | CVE-2016-0774 | linux-lts-vivid (Ubuntu) | Medium | Invalid | ||
1563916 | CVE-2016-0774 | linux-lts-vivid (Ubuntu Precise) | Medium | Invalid | ||
1563916 | CVE-2016-0774 | linux-lts-vivid (Ubuntu Trusty) | Medium | Invalid | ||
1563916 | CVE-2016-0774 | linux-lts-vivid (Ubuntu Vivid) | Undecided | Won't Fix | ||
1563916 | CVE-2016-0774 | linux-lts-vivid (Ubuntu Wily) | Medium | Invalid | ||
1563916 | CVE-2016-0774 | linux-lts-vivid (Ubuntu Xenial) | Medium | Invalid | ||
1563916 | CVE-2016-0774 | linux-mako (Ubuntu) | Medium | New | ||
1563916 | CVE-2016-0774 | linux-mako (Ubuntu Precise) | Medium | Invalid | ||
1563916 | CVE-2016-0774 | linux-mako (Ubuntu Trusty) | Medium | Invalid | ||
1563916 | CVE-2016-0774 | linux-mako (Ubuntu Vivid) | Undecided | Won't Fix | ||
1563916 | CVE-2016-0774 | linux-mako (Ubuntu Wily) | Medium | New | ||
1563916 | CVE-2016-0774 | linux-mako (Ubuntu Xenial) | Medium | New | ||
1563916 | CVE-2016-0774 | linux-lts-utopic (Ubuntu) | Medium | Invalid | ||
1563916 | CVE-2016-0774 | linux-lts-utopic (Ubuntu Precise) | Medium | Invalid | ||
1563916 | CVE-2016-0774 | linux-lts-utopic (Ubuntu Trusty) | Medium | Invalid |
Bug #1564815: Precise update to 3.2.79 stable release
Summary | In | Importance | Status | |||
---|---|---|---|---|---|---|
1564815 | Precise update to 3.2.79 stable release | linux (Ubuntu) | Undecided | Invalid | ||
1564815 | Precise update to 3.2.79 stable release | linux (Ubuntu Precise) | Undecided | Fix Released |
Bug #1571853: linux: 3.2.0-102.142 -proposed tracker
Summary | In | Importance | Status | |||
---|---|---|---|---|---|---|
1571853 | linux: 3.2.0-102.142 -proposed tracker | linux (Ubuntu) | Medium | Invalid | ||
1571853 | linux: 3.2.0-102.142 -proposed tracker | linux (Ubuntu Precise) | Medium | Fix Released | ||
1571853 | linux: 3.2.0-102.142 -proposed tracker | Kernel SRU Workflow | Medium | Fix Released | ||
1571853 | linux: 3.2.0-102.142 -proposed tracker | Kernel SRU Workflow automated-testing | Medium | Fix Released | ||
1571853 | linux: 3.2.0-102.142 -proposed tracker | Kernel SRU Workflow certification-testing | Medium | Invalid | ||
1571853 | linux: 3.2.0-102.142 -proposed tracker | Kernel SRU Workflow prepare-package | Medium | Fix Released | ||
1571853 | linux: 3.2.0-102.142 -proposed tracker | Kernel SRU Workflow prepare-package-lbm | Medium | Fix Released | ||
1571853 | linux: 3.2.0-102.142 -proposed tracker | Kernel SRU Workflow prepare-package-meta | Medium | Fix Released | ||
1571853 | linux: 3.2.0-102.142 -proposed tracker | Kernel SRU Workflow promote-to-proposed | Medium | Fix Released | ||
1571853 | linux: 3.2.0-102.142 -proposed tracker | Kernel SRU Workflow promote-to-security | Medium | Fix Released | ||
1571853 | linux: 3.2.0-102.142 -proposed tracker | Kernel SRU Workflow promote-to-updates | Medium | Fix Released | ||
1571853 | linux: 3.2.0-102.142 -proposed tracker | Kernel SRU Workflow regression-testing | Medium | Fix Released | ||
1571853 | linux: 3.2.0-102.142 -proposed tracker | Kernel SRU Workflow security-signoff | Medium | Fix Released | ||
1571853 | linux: 3.2.0-102.142 -proposed tracker | Kernel SRU Workflow verification-testing | Medium | Fix Released |
Bug #1572755: linux-armadaxp: 3.2.0-1665.90 -proposed tracker
Summary | In | Importance | Status | |||
---|---|---|---|---|---|---|
1572755 | linux-armadaxp: 3.2.0-1665.90 -proposed tracker | linux-armadaxp (Ubuntu) | Medium | Invalid | ||
1572755 | linux-armadaxp: 3.2.0-1665.90 -proposed tracker | linux-armadaxp (Ubuntu Precise) | Medium | Fix Released | ||
1572755 | linux-armadaxp: 3.2.0-1665.90 -proposed tracker | Kernel SRU Workflow | Medium | Fix Released | ||
1572755 | linux-armadaxp: 3.2.0-1665.90 -proposed tracker | Kernel SRU Workflow automated-testing | Medium | Invalid | ||
1572755 | linux-armadaxp: 3.2.0-1665.90 -proposed tracker | Kernel SRU Workflow certification-testing | Medium | Invalid | ||
1572755 | linux-armadaxp: 3.2.0-1665.90 -proposed tracker | Kernel SRU Workflow prepare-package | Medium | Fix Released | ||
1572755 | linux-armadaxp: 3.2.0-1665.90 -proposed tracker | Kernel SRU Workflow prepare-package-meta | Medium | Fix Released | ||
1572755 | linux-armadaxp: 3.2.0-1665.90 -proposed tracker | Kernel SRU Workflow promote-to-proposed | Medium | Fix Released | ||
1572755 | linux-armadaxp: 3.2.0-1665.90 -proposed tracker | Kernel SRU Workflow promote-to-security | Medium | Fix Released | ||
1572755 | linux-armadaxp: 3.2.0-1665.90 -proposed tracker | Kernel SRU Workflow promote-to-updates | Medium | Fix Released | ||
1572755 | linux-armadaxp: 3.2.0-1665.90 -proposed tracker | Kernel SRU Workflow regression-testing | Medium | Fix Released | ||
1572755 | linux-armadaxp: 3.2.0-1665.90 -proposed tracker | Kernel SRU Workflow security-signoff | Medium | Invalid | ||
1572755 | linux-armadaxp: 3.2.0-1665.90 -proposed tracker | Kernel SRU Workflow verification-testing | Medium | Fix Released |
Bug #1573271: linux-ti-omap4: 3.2.0-1480.106 -proposed tracker
Summary | In | Importance | Status | |||
---|---|---|---|---|---|---|
1573271 | linux-ti-omap4: 3.2.0-1480.106 -proposed tracker | linux-ti-omap4 (Ubuntu) | Medium | Invalid | ||
1573271 | linux-ti-omap4: 3.2.0-1480.106 -proposed tracker | linux-ti-omap4 (Ubuntu Precise) | Medium | Fix Released | ||
1573271 | linux-ti-omap4: 3.2.0-1480.106 -proposed tracker | Kernel SRU Workflow | Medium | Fix Released | ||
1573271 | linux-ti-omap4: 3.2.0-1480.106 -proposed tracker | Kernel SRU Workflow automated-testing | Medium | Invalid | ||
1573271 | linux-ti-omap4: 3.2.0-1480.106 -proposed tracker | Kernel SRU Workflow certification-testing | Medium | Invalid | ||
1573271 | linux-ti-omap4: 3.2.0-1480.106 -proposed tracker | Kernel SRU Workflow prepare-package | Medium | Fix Released | ||
1573271 | linux-ti-omap4: 3.2.0-1480.106 -proposed tracker | Kernel SRU Workflow prepare-package-meta | Medium | Fix Released | ||
1573271 | linux-ti-omap4: 3.2.0-1480.106 -proposed tracker | Kernel SRU Workflow promote-to-proposed | Medium | Fix Released | ||
1573271 | linux-ti-omap4: 3.2.0-1480.106 -proposed tracker | Kernel SRU Workflow promote-to-security | Medium | Fix Released | ||
1573271 | linux-ti-omap4: 3.2.0-1480.106 -proposed tracker | Kernel SRU Workflow promote-to-updates | Medium | Fix Released | ||
1573271 | linux-ti-omap4: 3.2.0-1480.106 -proposed tracker | Kernel SRU Workflow regression-testing | Medium | Fix Released | ||
1573271 | linux-ti-omap4: 3.2.0-1480.106 -proposed tracker | Kernel SRU Workflow security-signoff | Medium | Fix Released | ||
1573271 | linux-ti-omap4: 3.2.0-1480.106 -proposed tracker | Kernel SRU Workflow verification-testing | Medium | Fix Released |
See the
CVE page on Mitre.org
for more details.