Back to bug 2165824

Who When What Removed Added
TEJ RATHI 2023-01-31 08:37:08 UTC CC aileenc, alampare, alazarot, amctagga, andrew.slice, asoldano, balejosg, bbaranow, bmaxwell, bodavis, boliveir, brian.stansberry, cdewolf, chazlett, darran.lofthouse, dbhole, dhanak, dkreling, dosoudil, dymurray, emingora, eric.wittmann, etamir, fjuma, gjospin, gmalinko, gparvin, hhorak, ibek, ibolton, ivassile, iweiss, janstey, jmatthew, jmontleo, jorton, jpavlik, jrokos, jshaughn, jwendell, jwon, kanderso, kverlaen, lbacciot, lgao, lvaleeva, mnovotny, mosmerov, mpitt, msochure, msvehla, mwringe, nbecker, nboldt, njean, nodejs-maint, nwallace, ocs-bugs, omajid, oskutka, ovanders, owatkins, pahickey, pantinor, pdelbell, pdrozd, peholase, pjindal, pmackay, pskopek, rcernich, rguimara, rrajasek, rstancel, rwagner, scorneli, slucidi, smaestri, sseago, stcannon, sthorger, teagle, tkral, tom.jenkinson, zsvetlik
TEJ RATHI 2023-01-31 08:40:08 UTC Blocks 2165813
Sandipan Roy 2023-01-31 08:51:41 UTC Depends On 2165836, 2165831, 2165829, 2165830, 2165828, 2165835, 2165833, 2165832, 2165834
Borja Tarraso 2023-01-31 14:15:00 UTC Fixed In Version http-cache-semantics 4.1.1
Sandipan Roy 2023-01-31 15:39:38 UTC Depends On 2165963, 2165962
Red Hat Bugzilla 2023-01-31 22:27:15 UTC CC nbecker
Red Hat Bugzilla 2023-01-31 22:27:48 UTC CC etamir
Avinash Hanwate 2023-02-01 05:41:20 UTC Depends On 2166190, 2166192, 2166191, 2166189
Red Hat Bugzilla 2023-02-03 23:11:26 UTC CC ovanders
Tomáš Král 2023-02-13 11:18:30 UTC CC tkral
Patrick Del Bello 2023-03-01 02:40:58 UTC Depends On 2174279, 2174281, 2174284, 2174278, 2174280, 2174283, 2174286, 2174285, 2174287, 2174282
Patrick Del Bello 2023-03-01 02:42:25 UTC Doc Text A flaw was found in http-cache-semantics. Regular Expression Denial of Service cause by a malicious request header values sent to a server, when that server reads the cache policy from the request using this library.
RaTasha Tillery-Smith 2023-03-01 12:54:31 UTC Doc Text A flaw was found in http-cache-semantics. Regular Expression Denial of Service cause by a malicious request header values sent to a server, when that server reads the cache policy from the request using this library. A flaw was found in http-cache-semantics. When the server reads the cache policy from the request using this library, a Regular Expression Denial of Service occurs, caused by malicious request header values sent to the server.
RHEL Program Management Team 2023-03-06 15:56:13 UTC Depends On 2175833
RHEL Program Management Team 2023-03-06 15:56:19 UTC Depends On 2175834
RHEL Program Management Team 2023-03-06 15:56:25 UTC Depends On 2175835
RHEL Program Management Team 2023-03-06 15:56:32 UTC Depends On 2175836
RHEL Program Management Team 2023-03-14 11:26:22 UTC Depends On 2178091
RHEL Program Management Team 2023-03-14 11:26:28 UTC Depends On 2178092
RHEL Program Management Team 2023-03-14 11:26:50 UTC Depends On 2178093
RHEL Program Management Team 2023-03-14 11:26:56 UTC Depends On 2178094
RHEL Program Management Team 2023-03-14 11:27:01 UTC Depends On 2178095
RHEL Program Management Team 2023-03-14 11:27:24 UTC Depends On 2178096
RHEL Program Management Team 2023-03-14 11:27:30 UTC Depends On 2178097
RHEL Program Management Team 2023-03-14 11:27:35 UTC Depends On 2178098
RHEL Program Management Team 2023-03-14 12:19:41 UTC Depends On 2178147
RHEL Program Management Team 2023-03-14 12:19:47 UTC Depends On 2178148
RHEL Program Management Team 2023-03-14 12:19:53 UTC Depends On 2178149
errata-xmlrpc 2023-03-23 02:16:34 UTC Link ID Red Hat Product Errata RHSA-2023:1428
errata-xmlrpc 2023-03-30 12:36:03 UTC Link ID Red Hat Product Errata RHSA-2023:1533
errata-xmlrpc 2023-04-03 12:04:07 UTC Link ID Red Hat Product Errata RHBA-2023:1546
errata-xmlrpc 2023-04-04 09:48:21 UTC Link ID Red Hat Product Errata RHSA-2023:1582
errata-xmlrpc 2023-04-04 09:48:37 UTC Link ID Red Hat Product Errata RHSA-2023:1583
errata-xmlrpc 2023-04-12 14:58:49 UTC Link ID Red Hat Product Errata RHSA-2023:1742
errata-xmlrpc 2023-04-12 14:59:09 UTC Link ID Red Hat Product Errata RHSA-2023:1743
errata-xmlrpc 2023-04-12 15:07:51 UTC Link ID Red Hat Product Errata RHSA-2023:1744
errata-xmlrpc 2023-04-13 14:58:55 UTC Link ID Red Hat Product Errata RHBA-2023:1776
errata-xmlrpc 2023-04-17 07:30:51 UTC Link ID Red Hat Product Errata RHBA-2023:1799
errata-xmlrpc 2023-04-17 14:08:01 UTC Link ID Red Hat Product Errata RHBA-2023:1807
errata-xmlrpc 2023-04-17 14:08:16 UTC Link ID Red Hat Product Errata RHBA-2023:1808
Zack Miele 2023-04-18 21:00:57 UTC Depends On 2187840
errata-xmlrpc 2023-04-18 22:33:15 UTC Link ID Red Hat Product Errata RHBA-2023:1856
errata-xmlrpc 2023-04-19 23:50:26 UTC Link ID Red Hat Product Errata RHSA-2023:1887
errata-xmlrpc 2023-04-20 01:39:31 UTC Link ID Red Hat Product Errata RHSA-2023:1888
errata-xmlrpc 2023-04-24 01:07:51 UTC Link ID Red Hat Product Errata RHBA-2023:1927
errata-xmlrpc 2023-05-01 18:25:57 UTC Link ID Red Hat Product Errata RHSA-2023:2061
errata-xmlrpc 2023-05-02 16:19:39 UTC Link ID Red Hat Product Errata RHSA-2023:2083
errata-xmlrpc 2023-05-03 15:34:26 UTC Link ID Red Hat Product Errata RHSA-2023:2098
errata-xmlrpc 2023-05-03 20:15:13 UTC Link ID Red Hat Product Errata RHSA-2023:2104
errata-xmlrpc 2023-05-09 11:46:36 UTC Link ID Red Hat Product Errata RHSA-2023:2654
errata-xmlrpc 2023-05-09 11:46:53 UTC Link ID Red Hat Product Errata RHSA-2023:2655
Product Security DevOps Team 2023-05-09 20:33:38 UTC Resolution --- ERRATA
Status NEW CLOSED
Last Closed 2023-05-09 20:33:38 UTC
errata-xmlrpc 2023-06-27 11:29:07 UTC Link ID Red Hat Product Errata RHSA-2023:3815

Back to bug 2165824