Back to bug 2215393

Who When What Removed Added
Guilherme de Almeida Suckevicz 2023-06-15 19:31:27 UTC CC aileenc, bbuckingham, bcourt, dsimansk, ehelms, gmalinko, hhorak, janstey, jorton, jpavlik, jsherril, lball, lzap, matzew, mhulan, mizdebsk, myarboro, nmoumoul, orabin, pcreech, rchan, rhuss, skontopo
Guilherme de Almeida Suckevicz 2023-06-15 19:35:16 UTC Blocks 2215395
Guilherme de Almeida Suckevicz 2023-06-15 19:40:02 UTC Depends On 2215397, 2215398, 2215396
Avinash Hanwate 2023-06-20 04:36:27 UTC CC dfreiber, jburrell, rogbas, vkumar
CC jcantril, periklis
Sandipan Roy 2023-06-20 06:36:07 UTC Depends On 2216103, 2216104
Red Hat Bugzilla 2023-07-07 08:28:22 UTC Assignee security-response-team nobody
Red Hat Bugzilla 2023-07-21 22:26:28 UTC CC jpavlik
Chess Hazlett 2023-08-08 15:43:12 UTC Fixed In Version snappy-java 1.1.10.1
Chess Hazlett 2023-08-08 16:34:12 UTC Doc Text Snappy-java's shuffle function does not check input sizes before beginning operations. An attacker could send malicious input to trigger an overflow error, thereby crashing the program and achieving Denial of Service.
Chess Hazlett 2023-08-08 16:41:59 UTC Alias TRIAGE-CVE-2023-34453 CVE-2023-34453
Chess Hazlett 2023-08-08 16:43:23 UTC Summary TRIAGE-CVE-2023-34453 snappy-java: Integer overflow in shuffle leads to DoS CVE-2023-34453 snappy-java: Integer overflow in shuffle leads to DoS
Paige Jung 2023-08-08 16:55:03 UTC Doc Text Snappy-java's shuffle function does not check input sizes before beginning operations. An attacker could send malicious input to trigger an overflow error, thereby crashing the program and achieving Denial of Service. A flaw was found in Snappy-java's shuffle function, which does not check input sizes before beginning operations. This issue could allow an attacker to send malicious input to trigger an overflow error that crashes the program, resulting in a denial of service.

Back to bug 2215393