Back to bug 2164719
| Who | When | What | Removed | Added |
|---|---|---|---|---|
| Red Hat Bugzilla | 2023-03-02 08:27:46 UTC | Depends On | 2164721, 2164720 | |
| Depends On | 2164746 | |||
| CC | myarboro | |||
| Avinash Hanwate | 2023-03-16 04:34:42 UTC | Doc Text | A flaw was found in the rubygem-rack. Rack is vulnerable to a denial of service, caused by a regular expression denial of service (ReDoS) flaw in the Rack::Utils.get_byte_ranges function. By sending a specially-crafted regex input, a remote attacker could exploit this vulnerability to cause a denial of service condition. | |
| RaTasha Tillery-Smith | 2023-03-16 14:44:35 UTC | Doc Text | A flaw was found in the rubygem-rack. Rack is vulnerable to a denial of service, caused by a regular expression denial of service (ReDoS) flaw in the Rack::Utils.get_byte_ranges function. By sending a specially-crafted regex input, a remote attacker could exploit this vulnerability to cause a denial of service condition. | A flaw was found in rubygem-rack. Rack is vulnerable to a denial of service caused by a regular expression denial of service (ReDoS) flaw in the Rack::Utils.get_byte_ranges function. By sending a specially-crafted regex input, a remote attacker can cause a denial of service. |
| Red Hat Bugzilla | 2023-05-15 20:18:56 UTC | CC | btotty | |
| Red Hat Bugzilla | 2023-07-07 08:29:56 UTC | Assignee | security-response-team | nobody |
Back to bug 2164719