Back to bug 2174305
| Who | When | What | Removed | Added |
|---|---|---|---|---|
| Sandipan Roy | 2023-03-01 05:17:00 UTC | CC | apevec, eglynn, hhorak, jjoyce, jorton, lhh, mburns, mgarciac, rhos-maint, spower | |
| Sandipan Roy | 2023-03-01 05:17:11 UTC | Blocks | 2174153 | |
| Sandipan Roy | 2023-03-02 05:53:41 UTC | Depends On | 2174647, 2174649, 2174648, 2174646 | |
| Sandipan Roy | 2023-03-02 05:55:04 UTC | Depends On | 2174657, 2174655, 2174658 | |
| Sandipan Roy | 2023-03-02 05:58:30 UTC | Doc Text | A vulnerability was found in redis. Using this security flaw an authenticated users can use string matching commands (like SCAN or KEYS) with a specially crafted pattern to trigger a denial-of-service attack on Redis, causing it to hang and consume 100% of CPU time. | |
| RaTasha Tillery-Smith | 2023-03-02 13:01:58 UTC | Doc Text | A vulnerability was found in redis. Using this security flaw an authenticated users can use string matching commands (like SCAN or KEYS) with a specially crafted pattern to trigger a denial-of-service attack on Redis, causing it to hang and consume 100% of CPU time. | A vulnerability was found in Redis. This flaw allows an authenticated to use string matching commands (like SCAN or KEYS) with a specially crafted pattern to trigger a denial of service attack on Redis, causing it to hang and consume 100% of CPU time. |
| Red Hat Bugzilla | 2023-07-07 08:29:06 UTC | Assignee | security-response-team | nobody |
Back to bug 2174305