Back to bug 2224962
| Who | When | What | Removed | Added |
|---|---|---|---|---|
| TEJ RATHI | 2023-07-24 05:17:18 UTC | Blocks | 2223014 | |
| TEJ RATHI | 2023-07-24 05:17:41 UTC | CC | cllang, csutherl, dbelyavs, jclere, mmadzin, mturk, peholase, pjindal, plodge, rh-spice-bugs, szappis | |
| TEJ RATHI | 2023-07-24 05:37:13 UTC | CC | berrange, bootloader-eng-team, ddepaula, jferlan, kraxel, pbonzini, virt-maint, ymankad | |
| Sandipan Roy | 2023-07-25 04:04:52 UTC | Depends On | 2225351, 2225350, 2225352, 2225353, 2225349 | |
| Sandipan Roy | 2023-07-25 04:05:58 UTC | Alias | TRIAGE-CVE-2023-3446 | CVE-2023-3446 |
| Summary | TRIAGE-CVE-2023-3446 openssl: Excessive time spent checking DH keys and parameters | CVE-2023-3446 openssl: Excessive time spent checking DH keys and parameters | ||
| Sandipan Roy | 2023-07-25 04:08:57 UTC | Doc Text | A vulnerability was found in OpenSSL. This security flaw occurs because the applications that use the functions DH_check(), DH_check_ex() or EVP_PKEY_param_check() to check a DH key or DH parameters may experience long delays. Where the key or parameters that are being checked have been obtained from an untrusted source this may lead to a Denial of Service. | |
| TEJ RATHI | 2023-07-25 04:13:48 UTC | CC | jaredz, mlewando, pjanda, pjones, pkotvan, rharwood | |
| TEJ RATHI | 2023-07-25 04:15:30 UTC | CC | acrosby, adudiak, agarcial, aoconnor, asegurap, bdettelb, caswilli, dffrench, dfreiber, dhalasz, dkuc, fjansen, gmccullo, gzaronik, hkataria, jburrell, jmartine, jmitchel, jsherril, jtanner, kaycoth, kshier, ngough, nweather, psegedy, rgodfrey, rogbas, stcannon, sthirugn, tsasak, vkrizan, vkumar, vmugicag, yguenane | |
| Sandipan Roy | 2023-07-25 09:36:35 UTC | Depends On | 2225414, 2225415, 2225416, 2225417 | |
| RaTasha Tillery-Smith | 2023-07-25 12:22:03 UTC | Doc Text | A vulnerability was found in OpenSSL. This security flaw occurs because the applications that use the functions DH_check(), DH_check_ex() or EVP_PKEY_param_check() to check a DH key or DH parameters may experience long delays. Where the key or parameters that are being checked have been obtained from an untrusted source this may lead to a Denial of Service. | A vulnerability was found in OpenSSL. This security flaw occurs because the applications that use the DH_check(), DH_check_ex(), or EVP_PKEY_param_check() functions to check a DH key or DH parameters may experience long delays. Where the key or parameters that are being checked have been obtained from an untrusted source may lead to a denial of service. |
Back to bug 2224962