Back to bug 2209501

Who When What Removed Added
Sandipan Roy 2023-05-24 04:09:34 UTC CC nodejs-maint, zsvetlik
Sandipan Roy 2023-05-24 04:12:01 UTC Blocks 2209110
Sandipan Roy 2023-05-24 04:23:05 UTC Depends On 2209542, 2209540, 2209547, 2209546, 2209543, 2209545, 2209539, 2209541, 2209544
Sandipan Roy 2023-05-24 04:24:41 UTC Depends On 2209550, 2209552, 2209551, 2209549, 2209553, 2209555
RHEL Program Management Team 2023-05-30 11:02:55 UTC Depends On 2211040
RHEL Program Management Team 2023-05-30 11:03:02 UTC Depends On 2211041
RHEL Program Management Team 2023-05-30 11:03:08 UTC Depends On 2211042
RHEL Program Management Team 2023-05-30 11:03:24 UTC Depends On 2211043
RHEL Program Management Team 2023-05-30 11:03:40 UTC Depends On 2211044
RHEL Program Management Team 2023-06-05 14:45:40 UTC Depends On 2212440
RHEL Program Management Team 2023-06-05 14:45:47 UTC Depends On 2212441
Guilherme de Almeida Suckevicz 2023-06-13 16:36:11 UTC CC hhorak, jorton
Guilherme de Almeida Suckevicz 2023-06-13 16:39:44 UTC Depends On 2214632
errata-xmlrpc 2023-06-14 07:27:19 UTC Link ID Red Hat Product Errata RHSA-2023:3577
errata-xmlrpc 2023-06-14 08:39:13 UTC Link ID Red Hat Product Errata RHSA-2023:3586
errata-xmlrpc 2023-06-14 18:03:11 UTC Link ID Red Hat Product Errata RHBA-2023:3603
errata-xmlrpc 2023-06-19 00:24:49 UTC Link ID Red Hat Product Errata RHBA-2023:3657
errata-xmlrpc 2023-06-19 13:27:38 UTC Link ID Red Hat Product Errata RHBA-2023:3666
Sandipan Roy 2023-06-20 05:05:35 UTC Doc Text A vulnerability was found in c-ares. This security vulnerability occurs when /dev/urandom or RtlGenRandom() are unavailable, c-ares uses rand() to generate random numbers used for DNS query ids. This is not a CSPRNG, and it is also not seeded by srand() so will generate predictable output.
Paige Jung 2023-06-20 13:26:18 UTC Doc Text A vulnerability was found in c-ares. This security vulnerability occurs when /dev/urandom or RtlGenRandom() are unavailable, c-ares uses rand() to generate random numbers used for DNS query ids. This is not a CSPRNG, and it is also not seeded by srand() so will generate predictable output. A vulnerability was found in c-ares. This issue occurs when /dev/urandom or RtlGenRandom() are unavailable, c-ares will use rand() to generate random numbers used for DNS query ids. This is not a CSPRNG, and it is also not seeded by srand(), so it will generate predictable output.
Red Hat Bugzilla 2023-07-07 08:30:43 UTC Assignee security-response-team nobody
errata-xmlrpc 2023-07-12 08:12:37 UTC Link ID Red Hat Product Errata RHSA-2023:4036
errata-xmlrpc 2023-07-12 08:24:19 UTC Link ID Red Hat Product Errata RHSA-2023:4039
errata-xmlrpc 2023-07-12 08:25:22 UTC Link ID Red Hat Product Errata RHSA-2023:4035
errata-xmlrpc 2023-07-12 08:25:33 UTC Link ID Red Hat Product Errata RHSA-2023:4034
errata-xmlrpc 2023-07-12 08:26:17 UTC Link ID Red Hat Product Errata RHSA-2023:4033
errata-xmlrpc 2023-07-13 01:00:20 UTC Link ID Red Hat Product Errata RHBA-2023:4045
errata-xmlrpc 2023-07-13 01:06:14 UTC Link ID Red Hat Product Errata RHBA-2023:4046
errata-xmlrpc 2023-07-13 11:35:24 UTC Link ID Red Hat Product Errata RHBA-2023:4077
errata-xmlrpc 2023-07-13 11:42:15 UTC Link ID Red Hat Product Errata RHBA-2023:4078
errata-xmlrpc 2023-07-17 06:51:27 UTC Link ID Red Hat Product Errata RHBA-2023:4098

Back to bug 2209501