Back to bug 1816346
| Who | When | What | Removed | Added |
|---|---|---|---|---|
| Pedro Sampaio | 2020-03-23 20:17:26 UTC | Depends On | 1816347, 1816348 | |
| Pedro Sampaio | 2020-03-23 20:19:30 UTC | Blocks | 1816350 | |
| Ted Jongseok Won | 2020-03-25 00:49:03 UTC | Blocks | 1816350 | |
| Joshua Padman | 2020-03-26 00:07:49 UTC | Blocks | 1816350 | |
| Joshua Padman | 2020-03-26 00:14:52 UTC | CC | mkolesni, scohen | |
| Mark Cooper | 2020-04-24 02:00:34 UTC | CC | abonas, gbrown | |
| Product Security DevOps Team | 2020-04-24 04:31:45 UTC | Status | NEW | CLOSED |
| Resolution | --- | WONTFIX | ||
| Last Closed | 2020-04-24 04:31:45 UTC | |||
| Eric Christensen | 2021-06-09 13:35:07 UTC | Doc Text | A flaw was found in thrift. Golang Facebook Thrift servers would not error upon receiving messages declaring containers of sizes larger than the payload. As a result, malicious clients could send short messages which would result in a large memory allocation, potentially leading to denial of service. |
Back to bug 1816346