Back to bug 2172004
| Who | When | What | Removed | Added |
|---|---|---|---|---|
| TEJ RATHI | 2023-02-21 07:37:42 UTC | CC | core-kernel-mgr, debarshir, jshortt, than | |
| TEJ RATHI | 2023-02-21 07:38:31 UTC | CC | core-kernel-mgr, jshortt, than | |
| TEJ RATHI | 2023-02-21 07:39:41 UTC | Blocks | 2171901 | |
| Marian Rehak | 2023-02-21 14:57:08 UTC | Doc Text | A flaw was found in the LibRaw package. A stack buffer overflow in LibRaw_buffer_datastream::gets() in src/libraw_datastream.cpp caused by a maliciously crafted file may result in compromised Confidentiality, Integrity and application crash. | |
| Marian Rehak | 2023-02-21 15:06:26 UTC | Depends On | 2172133, 2172135, 2172134, 2172136 | |
| Marian Rehak | 2023-02-21 15:12:24 UTC | Depends On | 2172139, 2172138, 2172140 | |
| RaTasha Tillery-Smith | 2023-02-21 15:29:21 UTC | Doc Text | A flaw was found in the LibRaw package. A stack buffer overflow in LibRaw_buffer_datastream::gets() in src/libraw_datastream.cpp caused by a maliciously crafted file may result in compromised Confidentiality, Integrity and application crash. | A flaw was found in the LibRaw package. A stack buffer overflow in the LibRaw_buffer_datastream::gets() function in src/libraw_datastream.cpp caused by a maliciously crafted file may result in compromised confidentiality and integrity and an application crash. |
| Red Hat Bugzilla | 2023-07-07 08:34:33 UTC | Assignee | security-response-team | nobody |
Back to bug 2172004