Back to bug 2162182

Who When What Removed Added
Anten Skrabec 2023-01-19 03:53:07 UTC Depends On 2162186, 2162185, 2162187, 2162184, 2162188
Anten Skrabec 2023-01-19 03:53:11 UTC CC gparvin, jwendell, jwon, lball, matzew, nboldt, njean, osbuilders, ovanders, owatkins, pahickey, rcernich, rhuss, rrajasek, scorneli, stcannon, teagle
Anten Skrabec 2023-01-19 03:55:26 UTC CC dfreiber, jburrell, rogbas, vkumar
RaTasha Tillery-Smith 2023-01-19 16:01:12 UTC Doc Text A request smuggling attack is possible when using MaxBytesHandler. When using MaxBytesHandler, the body of an HTTP request is not fully consumed. When the server attempts to read HTTP2 frames from the connection, it will instead be reading the body of the HTTP request, which could be attacker-manipulated to represent arbitrary HTTP2 requests. A request smuggling attack is possible when using MaxBytesHandler. When using MaxBytesHandler, the body of an HTTP request is not fully consumed. When the server attempts to read HTTP2 frames from the connection, it will instead read the body of the HTTP request, which could be attacker-manipulated to represent arbitrary HTTP2 requests.
TEJ RATHI 2023-01-23 07:04:00 UTC Depends On 2163124, 2163125
Red Hat Bugzilla 2023-02-03 23:11:35 UTC CC ovanders
Red Hat Bugzilla 2023-05-15 18:03:56 UTC CC rrajasek
errata-xmlrpc 2023-05-17 22:31:22 UTC Link ID Red Hat Product Errata RHSA-2023:1326
Product Security DevOps Team 2023-05-18 04:44:48 UTC Resolution --- ERRATA
Status NEW CLOSED
Last Closed 2023-05-18 04:44:48 UTC
errata-xmlrpc 2023-08-14 01:02:32 UTC Link ID Red Hat Product Errata RHSA-2023:4627
Carl George 🤠 2023-08-16 02:34:21 UTC Depends On 2232267

Back to bug 2162182