Back to bug 2161901
| Who | When | What | Removed | Added |
|---|---|---|---|---|
| Avinash Hanwate | 2023-01-18 08:44:05 UTC | CC | ellin, erack, fmuellner, fzatlouk, gparvin, jhorak, klember, njean, owatkins, pahickey, polkit-devel, rgarg, scorneli, shbose, stcannon, stransky, teagle, tpopela, ubhargav | |
| Avinash Hanwate | 2023-01-18 08:50:12 UTC | Blocks | 2161902 | |
| TEJ RATHI | 2023-01-25 07:36:04 UTC | Depends On | 2164317 | |
| Jan Rybar | 2023-01-25 12:27:52 UTC | CC | polkit-devel | |
| TEJ RATHI | 2023-02-27 05:03:05 UTC | Doc Text | A Regular Expression Denial of Service (ReDoS) vulnerability was found in cookiejar via the Cookie.parse function and other aspects of the API, which uses an insecure regular expression for parsing cookie values. Applications could be stalled for extended periods of time if untrusted input is passed to cookie values or attempted to parse from request headers.regular expression. | |
| Red Hat Bugzilla | 2023-07-07 08:27:55 UTC | Assignee | security-response-team | nobody |
Back to bug 2161901