Back to bug 2216227
| Who | When | What | Removed | Added |
|---|---|---|---|---|
| TEJ RATHI | 2023-06-20 14:34:16 UTC | CC | security-response-team | |
| TEJ RATHI | 2023-06-20 14:40:09 UTC | CC | jburrell, mosvald, pemensik | |
| TEJ RATHI | 2023-06-20 14:52:59 UTC | CC | dhughes, eglynn, jjoyce, lhh, mburns, mgarciac, pgrist | |
| TEJ RATHI | 2023-06-20 15:09:43 UTC | Depends On | 2216246, 2216244, 2216245, 2216243 | |
| TEJ RATHI | 2023-06-20 15:12:17 UTC | Depends On | 2216247, 2216250, 2216249, 2216248 | |
| TEJ RATHI | 2023-06-20 15:19:59 UTC | Blocks | 2216252 | |
| Anten Skrabec | 2023-06-21 22:28:34 UTC | CC | askrabec | |
| Sandipan Roy | 2023-06-22 05:56:50 UTC | Deadline | 2023-06-21 | |
| Summary | EMBARGOED TRIAGE-CVE-2023-2828 bind: named's configured cache size limit can be significantly exceeded | TRIAGE-CVE-2023-2828 bind: named's configured cache size limit can be significantly exceeded | ||
| Group | security, qe_staff | |||
| Sandipan Roy | 2023-06-22 06:02:29 UTC | Depends On | 2216628, 2216627 | |
| TEJ RATHI | 2023-06-22 06:07:44 UTC | Alias | TRIAGE-CVE-2023-2828 | CVE-2023-2828 |
| Summary | TRIAGE-CVE-2023-2828 bind: named's configured cache size limit can be significantly exceeded | CVE-2023-2828 TRIAGE-CVE-2023-2828 bind: named's configured cache size limit can be significantly exceeded | ||
| TEJ RATHI | 2023-06-22 06:08:19 UTC | Summary | CVE-2023-2828 TRIAGE-CVE-2023-2828 bind: named's configured cache size limit can be significantly exceeded | CVE-2023-2828 bind: named's configured cache size limit can be significantly exceeded |
| Sandipan Roy | 2023-06-22 06:14:12 UTC | Depends On | 2216650, 2216649, 2216645, 2216647, 2216655, 2216653, 2216651, 2216642, 2216643, 2216654, 2216656, 2216644, 2216657, 2216652, 2216646, 2216648 | |
| Sandipan Roy | 2023-06-22 06:22:55 UTC | Doc Text | A vulnerability was found in BIND. By this security flaw, it has been discovered that the effectiveness of the cache-cleaning algorithm used in named can be severely diminished by querying the resolver for specific RRsets in a certain order, effectively allowing the configured max-cache-size limit to be significantly exceeded. | |
| Stepan Broz | 2023-06-22 10:44:18 UTC | CC | sbroz | |
| RaTasha Tillery-Smith | 2023-06-22 12:57:33 UTC | Doc Text | A vulnerability was found in BIND. By this security flaw, it has been discovered that the effectiveness of the cache-cleaning algorithm used in named can be severely diminished by querying the resolver for specific RRsets in a certain order, effectively allowing the configured max-cache-size limit to be significantly exceeded. | A vulnerability was found in BIND. The effectiveness of the cache-cleaning algorithm used in named can be severely diminished by querying the resolver for specific RRsets in a certain order, effectively allowing the configured max-cache-size limit to exceed significantly. |
| Avinash Hanwate | 2023-06-28 13:00:46 UTC | CC | dhughes, eglynn, jjoyce, lhh, mburns, mgarciac, pgrist | |
| Kazu Yoshida | 2023-07-02 03:13:27 UTC | CC | kyoshida | |
| Red Hat Bugzilla | 2023-07-07 08:30:06 UTC | Assignee | security-response-team | nobody |
| CC | security-response-team | |||
| errata-xmlrpc | 2023-07-10 09:23:33 UTC | Link ID | Red Hat Product Errata RHSA-2023:4005 | |
| errata-xmlrpc | 2023-07-12 08:26:12 UTC | Link ID | Red Hat Product Errata RHSA-2023:4037 | |
| errata-xmlrpc | 2023-07-17 08:48:35 UTC | Link ID | Red Hat Product Errata RHSA-2023:4099 | |
| errata-xmlrpc | 2023-07-17 08:50:14 UTC | Link ID | Red Hat Product Errata RHSA-2023:4101 | |
| errata-xmlrpc | 2023-07-17 08:51:36 UTC | Link ID | Red Hat Product Errata RHSA-2023:4100 | |
| errata-xmlrpc | 2023-07-17 08:51:46 UTC | Link ID | Red Hat Product Errata RHSA-2023:4102 | |
| errata-xmlrpc | 2023-07-17 18:23:50 UTC | Link ID | Red Hat Product Errata RHBA-2023:4116 | |
| errata-xmlrpc | 2023-07-18 08:25:19 UTC | Link ID | Red Hat Product Errata RHSA-2023:4154 | |
| errata-xmlrpc | 2023-07-18 08:25:29 UTC | Link ID | Red Hat Product Errata RHSA-2023:4153 | |
| errata-xmlrpc | 2023-07-18 08:28:23 UTC | Link ID | Red Hat Product Errata RHSA-2023:4152 | |
| errata-xmlrpc | 2023-07-18 09:02:57 UTC | Link ID | Red Hat Product Errata RHBA-2023:4119 | |
| errata-xmlrpc | 2023-07-19 10:52:18 UTC | Link ID | Red Hat Product Errata RHBA-2023:4206 | |
| errata-xmlrpc | 2023-07-19 12:57:38 UTC | Link ID | Red Hat Product Errata RHBA-2023:4207 | |
| errata-xmlrpc | 2023-07-25 16:42:47 UTC | Link ID | Red Hat Product Errata RHBA-2023:4273 | |
| errata-xmlrpc | 2023-07-31 09:33:09 UTC | Link ID | Red Hat Product Errata RHSA-2023:4332 | |
| Product Security DevOps Team | 2023-08-01 11:34:41 UTC | Resolution | --- | ERRATA |
| Status | NEW | CLOSED | ||
| Last Closed | 2023-08-01 11:34:41 UTC | |||
| errata-xmlrpc | 2023-08-02 09:32:59 UTC | Link ID | Red Hat Product Errata RHBA-2023:4430 | |
| errata-xmlrpc | 2023-08-07 00:39:38 UTC | Link ID | Red Hat Product Errata RHBA-2023:4489 | |
| errata-xmlrpc | 2023-08-07 11:18:10 UTC | Link ID | Red Hat Product Errata RHBA-2023:4501 | |
| errata-xmlrpc | 2023-08-09 01:45:07 UTC | Link ID | Red Hat Product Errata RHBA-2023:4584 |
Back to bug 2216227