Back to bug 2179139
| Who | When | What | Removed | Added |
|---|---|---|---|---|
| Anten Skrabec | 2023-03-16 17:31:28 UTC | CC | security-response-team | |
| Anten Skrabec | 2023-03-16 17:31:36 UTC | Doc Text | Attackers can send large request bodies for routes that have Lua filter enabled and trigger crashes. | Attackers can send large request bodies for routes that have Lua filter enabled and trigger crashes. |
| Anten Skrabec | 2023-03-16 17:31:52 UTC | Blocks | 2178208 | |
| Paige Jung | 2023-03-16 17:55:04 UTC | Doc Text | Attackers can send large request bodies for routes that have Lua filter enabled and trigger crashes. | A flaw was found in Envoy. This issue may allow attackers to send large request bodies for routes that have the Lua filter enabled, which will trigger a crash. |
| Sam Fowler | 2023-03-19 22:52:40 UTC | Doc Type | --- | If docs needed, set a value |
| CC | ovanders | sfowler, twalsh | ||
| Pedro Sampaio | 2023-04-04 21:04:55 UTC | Group | qe_staff, security | |
| Summary | EMBARGOED CVE-2023-27492 envoy: Crash when a large request body is processed in Lua filter | CVE-2023-27492 envoy: Crash when a large request body is processed in Lua filter | ||
| Deadline | 2023-04-04 | |||
| Red Hat Bugzilla | 2023-07-07 08:27:47 UTC | Assignee | security-response-team | nobody |
| CC | security-response-team | |||
| errata-xmlrpc | 2023-08-11 16:48:14 UTC | Link ID | Red Hat Product Errata RHSA-2023:4623 | |
| Product Security DevOps Team | 2023-08-11 21:12:32 UTC | Status | NEW | CLOSED |
| Resolution | --- | ERRATA | ||
| Last Closed | 2023-08-11 21:12:32 UTC |
Back to bug 2179139