Back to bug 2220812

Who When What Removed Added
TEJ RATHI 2023-07-06 06:14:18 UTC CC fjansen, grafana-maint, jkurik, nathans, scox
TEJ RATHI 2023-07-06 06:22:45 UTC Depends On 2220815, 2220816
TEJ RATHI 2023-07-06 06:24:07 UTC Blocks 2220817
TEJ RATHI 2023-07-06 07:50:06 UTC CC dfreiber, jburrell, rogbas, vkumar
TEJ RATHI 2023-07-06 07:51:21 UTC CC amctagga, aoconnor, bniver, flucifre, gmeno, mbenjamin, mhackett, sostapov, vereddy
TEJ RATHI 2023-07-06 07:52:55 UTC Depends On 2220831, 2220830
TEJ RATHI 2023-07-06 07:58:29 UTC Depends On 2220832
Red Hat Bugzilla 2023-07-07 08:32:08 UTC Assignee security-response-team nobody
Avinash Hanwate 2023-07-10 09:52:49 UTC Alias TRIAGE-CVE-2023-36665 CVE-2023-36665
Doc Text A flaw was found in the protobuf.js. The affected versions of protobuf.js could allow a remote attacker to execute arbitrary code on the system, caused by prototype pollution. By sending a specially crafted message, an attacker could exploit this vulnerability to execute arbitrary code on the system.
RaTasha Tillery-Smith 2023-07-10 13:19:52 UTC Doc Text A flaw was found in the protobuf.js. The affected versions of protobuf.js could allow a remote attacker to execute arbitrary code on the system, caused by prototype pollution. By sending a specially crafted message, an attacker could exploit this vulnerability to execute arbitrary code on the system. A flaw was found in the protobuf.js. The affected versions of protobuf.js could allow a remote attacker to execute arbitrary code on the system caused by prototype pollution. By sending a specially crafted message, an attacker can execute arbitrary code on the system.
Avinash Hanwate 2023-07-20 16:10:52 UTC Summary TRIAGE-CVE-2023-36665 protobufjs: prototype pollution using user-controlled protobuf message CVE-2023-36665 protobufjs: prototype pollution using user-controlled protobuf message

Back to bug 2220812