Back to bug 2174306
| Who | When | What | Removed | Added |
|---|---|---|---|---|
| Sandipan Roy | 2023-03-01 05:18:45 UTC | CC | apevec, eglynn, hhorak, jjoyce, jorton, lhh, mburns, mgarciac, rhos-maint, spower | |
| Sandipan Roy | 2023-03-01 05:19:00 UTC | Blocks | 2174153 | |
| Sandipan Roy | 2023-03-02 05:55:07 UTC | Depends On | 2174651, 2174656, 2174654, 2174660, 2174653, 2174659, 2174652 | |
| Sandipan Roy | 2023-03-02 05:57:35 UTC | Doc Text | A vulnerability was found in redis. Using this security flaw an authenticated users issuing specially crafted SRANDMEMBER, ZRANDMEMBER, and HRANDFIELD commands can trigger an integer overflow, resulting in a runtime assertion and termination of the Redis server process. | |
| RaTasha Tillery-Smith | 2023-03-02 13:03:20 UTC | Doc Text | A vulnerability was found in redis. Using this security flaw an authenticated users issuing specially crafted SRANDMEMBER, ZRANDMEMBER, and HRANDFIELD commands can trigger an integer overflow, resulting in a runtime assertion and termination of the Redis server process. | A vulnerability was found in Redis. This flaw allows authenticated users issuing specially crafted SRANDMEMBER, ZRANDMEMBER, and HRANDFIELD commands to trigger an integer overflow, resulting in a runtime assertion and termination of the Redis server process. |
| Red Hat Bugzilla | 2023-07-07 08:31:07 UTC | Assignee | security-response-team | nobody |
Back to bug 2174306