Back to bug 2149706

Who When What Removed Added
Pedro Sampaio 2022-11-30 16:50:49 UTC Depends On 2149707, 2149710, 2149709, 2149708
Pedro Sampaio 2022-11-30 16:55:43 UTC Blocks 2149712
Jun Aruga 2022-12-01 14:24:57 UTC CC jaruga
Sandipan Roy 2022-12-06 14:41:25 UTC Depends On 2151265, 2151266, 2151268, 2151263, 2151269, 2151267, 2151262, 2151264
Sandipan Roy 2022-12-06 14:43:14 UTC Doc Text A vulnerability was found in Ruby that allows HTTP header injection. Suppose a CGI application using the CGI library inserts untrusted input into the HTTP response header. In that case, an attacker can exploit it to insert a newline character to split a header, and inject malicious content to deceive clients.
Paige Jung 2022-12-06 17:24:01 UTC Doc Text A vulnerability was found in Ruby that allows HTTP header injection. Suppose a CGI application using the CGI library inserts untrusted input into the HTTP response header. In that case, an attacker can exploit it to insert a newline character to split a header, and inject malicious content to deceive clients. A vulnerability was found in Ruby that allows HTTP header injection. A CGI application using the CGI library may insert untrusted input into the HTTP response header. This issue can allow an attacker to insert a newline character to split a header and inject malicious content to deceive clients.
RHEL Program Management Team 2023-04-25 11:12:43 UTC Depends On 2189468
errata-xmlrpc 2023-05-24 08:55:57 UTC Link ID Red Hat Product Errata RHSA-2023:3291
errata-xmlrpc 2023-06-27 14:57:54 UTC Link ID Red Hat Product Errata RHSA-2023:3821
Product Security DevOps Team 2023-06-27 19:29:01 UTC Status NEW CLOSED
Resolution --- ERRATA
Last Closed 2023-06-27 19:29:01 UTC

Back to bug 2149706