Back to bug 2074792
| Who | When | What | Removed | Added |
|---|---|---|---|---|
| Avinash Hanwate | 2022-04-13 06:02:50 UTC | Blocks | 2074793 | |
| Avinash Hanwate | 2022-04-18 12:04:22 UTC | Depends On | 2076228, 2076227 | |
| Avinash Hanwate | 2022-04-19 05:02:39 UTC | CC | etamir, nbecker, ocs-bugs | |
| Avinash Hanwate | 2022-04-25 05:20:44 UTC | Doc Text | A flaw was found in MongoDB. An attacker could maliciously crash MongoDB in a DoS attack if they could cause an extremely long aggregation pipeline in conjunction with a specific stage/operator which will lead to stack overflow due to the size of the stack frames used by that stage. | |
| RaTasha Tillery-Smith | 2022-04-25 12:06:06 UTC | Doc Text | A flaw was found in MongoDB. An attacker could maliciously crash MongoDB in a DoS attack if they could cause an extremely long aggregation pipeline in conjunction with a specific stage/operator which will lead to stack overflow due to the size of the stack frames used by that stage. | A flaw was found in MongoDB. This flaw allows an attacker to maliciously crash MongoDB in a denial of service attack if they can cause an extremely long aggregation pipeline in conjunction with a specific stage/operator, which leads to a stack overflow due to the size of the stack frames used by that stage. |
| Borja Tarraso | 2022-05-06 10:35:17 UTC | CC | bbuckingham, bcourt, btotty, ehelms, jsherril, lzap, mhulan, mmccune, myarboro, nmoumoul, orabin, pcreech, rchan | |
| Borja Tarraso | 2022-05-06 10:51:19 UTC | CC | bbuckingham, bcourt, btotty, ehelms, jsherril, lzap, mhulan, mmccune, myarboro, nmoumoul, orabin, pcreech, rchan | |
| Red Hat Bugzilla | 2022-07-18 09:51:10 UTC | CC | mmccune | |
| Red Hat Bugzilla | 2023-01-01 05:32:14 UTC | CC | amctagga | |
| Red Hat Bugzilla | 2023-03-02 08:27:33 UTC | CC | myarboro | |
| Red Hat Bugzilla | 2023-05-15 20:18:52 UTC | CC | btotty | |
| Red Hat Bugzilla | 2023-07-07 08:31:45 UTC | Assignee | security-response-team | nobody |
Back to bug 2074792