Back to bug 2182155

Who When What Removed Added
Anten Skrabec 2023-03-27 17:33:34 UTC CC security-response-team
Anten Skrabec 2023-03-27 17:34:10 UTC Blocks 2178208
Anten Skrabec 2023-03-27 17:42:50 UTC Doc Text If Envoy is running with the OAuth filter enabled exposed, a malicious
actor could construct a request which would cause denial of service by
crashing Envoy.
If Envoy is running with the OAuth filter enabled exposed, a malicious actor could construct a request which would cause denial of service by crashing Envoy.
Paige Jung 2023-03-27 17:45:56 UTC Doc Text If Envoy is running with the OAuth filter enabled exposed, a malicious actor could construct a request which would cause denial of service by crashing Envoy. A flaw was found in Envoy. If Envoy is running with the OAuth filter enabled, a malicious actor could construct a request which would cause denial of service, crashing Envoy.
Dhananjay Arunesh 2023-04-05 12:08:23 UTC Summary EMBARGOED CVE-2023-27496 envoy: Crash when a redirect url without a state param is received in the oauth filter CVE-2023-27496 envoy: Crash when a redirect url without a state param is received in the oauth filter
Deadline 2023-04-04
Group security, qe_staff
Red Hat Bugzilla 2023-07-07 08:35:27 UTC CC security-response-team
Assignee security-response-team nobody
errata-xmlrpc 2023-08-11 16:48:14 UTC Link ID Red Hat Product Errata RHSA-2023:4623
Product Security DevOps Team 2023-08-11 21:13:31 UTC Status NEW CLOSED
Resolution --- ERRATA
Last Closed 2023-08-11 21:13:31 UTC

Back to bug 2182155