Back to bug 2102598
| Who | When | What | Removed | Added |
|---|---|---|---|---|
| Marian Rehak | 2022-06-30 10:13:52 UTC | Depends On | 2102599 | |
| Blocks | 2102600 | |||
| Sandipan Roy | 2022-07-01 06:49:47 UTC | Doc Text | A low impacted security flaw found in protobuf-c. In this security flaw an invalid arithmetic shift via the function parse_tag_and_wiretype in protobuf-c/protobuf-c.c. This vulnerability allows attackers to cause a Denial of Service (DoS) via unspecified vectors. | |
| Sandipan Roy | 2022-07-01 06:51:03 UTC | Depends On | 2102961, 2102962 | |
| RaTasha Tillery-Smith | 2022-07-01 12:15:59 UTC | Doc Text | A low impacted security flaw found in protobuf-c. In this security flaw an invalid arithmetic shift via the function parse_tag_and_wiretype in protobuf-c/protobuf-c.c. This vulnerability allows attackers to cause a Denial of Service (DoS) via unspecified vectors. | A flaw was found in protobuf-c. The issue occurs due to an invalid arithmetic shift via the parse_tag_and_wiretype in the protobuf-c/protobuf-c.c function. This flaw allows attackers to cause a denial of service (DoS) via unspecified vectors. |
| Igor Raits | 2022-08-30 12:14:15 UTC | CC | igor.raits | |
| Red Hat Bugzilla | 2023-07-07 08:31:20 UTC | Assignee | security-response-team | nobody |
Back to bug 2102598