Back to bug 2211827
| Who | When | What | Removed | Added |
|---|---|---|---|---|
| Dhananjay Arunesh | 2023-06-02 07:14:08 UTC | Blocks | 2160453 | |
| Dhananjay Arunesh | 2023-06-05 04:22:05 UTC | CC | mcatanza, mdean, rh-spice-bugs, virt-maint, walters | |
| Dhananjay Arunesh | 2023-06-06 07:20:08 UTC | Depends On | 2212692, 2212691, 2212695, 2212694 | |
| Dhananjay Arunesh | 2023-06-06 07:20:09 UTC | Depends On | 2212689, 2212697, 2212693, 2212688, 2212690, 2212696 | |
| Red Hat Bugzilla | 2023-07-07 08:28:37 UTC | Assignee | security-response-team | nobody |
| Pedro Sampaio | 2023-07-20 20:18:23 UTC | Doc Text | GLib's GVariant deserialization is vulnerable to an exponential blowup issue where a crafted GVariant can cause excessive processing, leading to denial of service. | |
| Paige Jung | 2023-07-20 20:47:17 UTC | Doc Text | GLib's GVariant deserialization is vulnerable to an exponential blowup issue where a crafted GVariant can cause excessive processing, leading to denial of service. | A flaw was found in GLib. GVariant deserialization is vulnerable to an exponential blowup issue where a crafted GVariant can cause excessive processing, leading to denial of service. |
Back to bug 2211827