Back to bug 1928172
| Who | When | What | Removed | Added |
|---|---|---|---|---|
| Guilherme de Almeida Suckevicz | 2021-02-12 14:49:26 UTC | Blocks | 1928173 | |
| Guilherme de Almeida Suckevicz | 2021-02-12 14:50:07 UTC | Depends On | 1928176, 1928174, 1928175 | |
| Ted Jongseok Won | 2021-02-15 09:54:51 UTC | Fixed In Version | libthrift 0.14.0 | |
| Ted Jongseok Won | 2021-02-15 10:16:42 UTC | Summary | CVE-2020-13949 thrift: potential DoS when processing untrusted payloads | CVE-2020-13949 libthrift: potential DoS when processing untrusted payloads |
| Ted Jongseok Won | 2021-02-15 10:44:06 UTC | Priority | medium | high |
| Severity | medium | high | ||
| Jonathan Christison | 2021-02-15 13:58:55 UTC | Comment | 9 | updated |
| Przemyslaw Roguski | 2021-02-15 15:26:30 UTC | CC | jhrozek, josorior, mrogers, pdhamdhe, team-winc, xiyuan | |
| Przemyslaw Roguski | 2021-02-15 15:32:54 UTC | Depends On | 1928815, 1928810, 1928813, 1928809, 1928811, 1928812, 1928814, 1928808 | |
| Todd Cullum | 2021-02-15 19:03:20 UTC | Depends On | 1928896, 1928895 | |
| Eric Christensen | 2021-02-15 20:35:24 UTC | Doc Text | A flaw was found in libthrift. Applications using Thrift would not error upon receiving messages declaring containers of sizes larger than the payload resulting in malicious RPC clients with the ability to send short messages which would result in a large memory allocation, potentially leading to denial of service. The highest threat from this vulnerability is to system availability. | |
| Sage McTaggart | 2021-02-15 22:02:10 UTC | Doc Text | A flaw was found in libthrift. Applications using Thrift would not error upon receiving messages declaring containers of sizes larger than the payload resulting in malicious RPC clients with the ability to send short messages which would result in a large memory allocation, potentially leading to denial of service. The highest threat from this vulnerability is to system availability. | A flaw was found in libthrift. Applications using Thrift would not show an error upon receiving messages declaring containers of sizes larger than the payload. This results in malicious RPC clients with the ability to send short messages which would result in a large memory allocation, potentially leading to denial of service. The highest threat from this vulnerability is to system availability. |
| Mark Cooper | 2021-02-16 01:54:18 UTC | CC | jcosta, swshanka | |
| Red Hat Bugzilla | 2021-02-16 03:19:23 UTC | CC | willb | |
| Anten Skrabec | 2021-02-16 18:50:51 UTC | Depends On | 1929386 | |
| Florencio Cano | 2021-02-18 08:40:07 UTC | CC | kaycoth | |
| Florencio Cano | 2021-02-18 08:56:50 UTC | Depends On | 1930027, 1930026, 1930024, 1930025 | |
| Beth White | 2021-02-18 14:47:06 UTC | CC | beth.white | |
| Depends On | 1930234, 1930233 | |||
| Sam Fowler | 2021-04-12 07:00:35 UTC | Status | NEW | CLOSED |
| CC | lnacshon | |||
| Resolution | --- | WONTFIX | ||
| Last Closed | 2021-03-30 11:51:18 UTC | |||
| CC | alazar, lgamliel, mfilanov, rfreiman | |||
| Jonathan Christison | 2021-06-23 08:56:41 UTC | CC | jnethert | |
| errata-xmlrpc | 2021-06-24 15:20:01 UTC | Link ID | Red Hat Product Errata RHSA-2021:2543 | |
| errata-xmlrpc | 2021-12-14 21:33:42 UTC | Link ID | Red Hat Product Errata RHSA-2021:5134 |
Back to bug 1928172