Back to bug 2213863

Who When What Removed Added
Chess Hazlett 2023-06-09 16:14:21 UTC CC aileenc, asoldano, bbaranow, bmaxwell, brian.stansberry, cdewolf, darran.lofthouse, dkreling, dosoudil, fjuma, gmalinko, ivassile, iweiss, janstey, jpavlik, jross, jscholz, lgao, mosmerov, msochure, mstefank, msvehla, nwallace, pdelbell, pjindal, pmackay, rjohnson, rstancel, smaestri, swoodman, tom.jenkinson
Chess Hazlett 2023-06-09 16:21:59 UTC CC adupliak, alampare, bbuckingham, bcourt, ehelms, emingora, fmongiar, hbraun, jnethert, jpoth, jsherril, lpetrovi, lzap, mhulan, mnovotny, myarboro, nmoumoul, orabin, pcreech, peholase, rchan, rguimara, rrajasek, rsynek, saroy, tcunning, yfang
Chess Hazlett 2023-06-09 16:23:38 UTC Depends On 2213870
RaTasha Tillery-Smith 2023-06-12 11:58:54 UTC Doc Text A denial of service vulnerability was found in janino compiler. If the parser runs on user-supplied input, an attacker could supply content that causes the parser to crash due to a stack overflow.
Doc Text A denial of service vulnerability was found in janino compiler. If the parser runs on user-supplied input, an attacker could supply content that causes the parser to crash due to a stack overflow. A denial of service vulnerability was found in the janino compiler. If the parser runs on user-supplied input, an attacker could supply content that causes the parser to crash due to a stack overflow.
Red Hat Bugzilla 2023-07-07 08:29:06 UTC Assignee security-response-team nobody
Red Hat Bugzilla 2023-07-21 22:26:24 UTC CC jpavlik

Back to bug 2213863