Back to bug 2149706
| Who | When | What | Removed | Added |
|---|---|---|---|---|
| Pedro Sampaio | 2022-11-30 16:50:49 UTC | Depends On | 2149707, 2149710, 2149709, 2149708 | |
| Pedro Sampaio | 2022-11-30 16:55:43 UTC | Blocks | 2149712 | |
| Jun Aruga | 2022-12-01 14:24:57 UTC | CC | jaruga | |
| Sandipan Roy | 2022-12-06 14:41:25 UTC | Depends On | 2151265, 2151266, 2151268, 2151263, 2151269, 2151267, 2151262, 2151264 | |
| Sandipan Roy | 2022-12-06 14:43:14 UTC | Doc Text | A vulnerability was found in Ruby that allows HTTP header injection. Suppose a CGI application using the CGI library inserts untrusted input into the HTTP response header. In that case, an attacker can exploit it to insert a newline character to split a header, and inject malicious content to deceive clients. | |
| Paige Jung | 2022-12-06 17:24:01 UTC | Doc Text | A vulnerability was found in Ruby that allows HTTP header injection. Suppose a CGI application using the CGI library inserts untrusted input into the HTTP response header. In that case, an attacker can exploit it to insert a newline character to split a header, and inject malicious content to deceive clients. | A vulnerability was found in Ruby that allows HTTP header injection. A CGI application using the CGI library may insert untrusted input into the HTTP response header. This issue can allow an attacker to insert a newline character to split a header and inject malicious content to deceive clients. |
| RHEL Program Management Team | 2023-04-25 11:12:43 UTC | Depends On | 2189468 | |
| errata-xmlrpc | 2023-05-24 08:55:57 UTC | Link ID | Red Hat Product Errata RHSA-2023:3291 | |
| errata-xmlrpc | 2023-06-27 14:57:54 UTC | Link ID | Red Hat Product Errata RHSA-2023:3821 | |
| Product Security DevOps Team | 2023-06-27 19:29:01 UTC | Status | NEW | CLOSED |
| Resolution | --- | ERRATA | ||
| Last Closed | 2023-06-27 19:29:01 UTC |
Back to bug 2149706