Back to bug 2182155
| Who | When | What | Removed | Added |
|---|---|---|---|---|
| Anten Skrabec | 2023-03-27 17:33:34 UTC | CC | security-response-team | |
| Anten Skrabec | 2023-03-27 17:34:10 UTC | Blocks | 2178208 | |
| Anten Skrabec | 2023-03-27 17:42:50 UTC | Doc Text | If Envoy is running with the OAuth filter enabled exposed, a malicious actor could construct a request which would cause denial of service by crashing Envoy. | If Envoy is running with the OAuth filter enabled exposed, a malicious actor could construct a request which would cause denial of service by crashing Envoy. |
| Paige Jung | 2023-03-27 17:45:56 UTC | Doc Text | If Envoy is running with the OAuth filter enabled exposed, a malicious actor could construct a request which would cause denial of service by crashing Envoy. | A flaw was found in Envoy. If Envoy is running with the OAuth filter enabled, a malicious actor could construct a request which would cause denial of service, crashing Envoy. |
| Dhananjay Arunesh | 2023-04-05 12:08:23 UTC | Summary | EMBARGOED CVE-2023-27496 envoy: Crash when a redirect url without a state param is received in the oauth filter | CVE-2023-27496 envoy: Crash when a redirect url without a state param is received in the oauth filter |
| Deadline | 2023-04-04 | |||
| Group | security, qe_staff | |||
| Red Hat Bugzilla | 2023-07-07 08:35:27 UTC | CC | security-response-team | |
| Assignee | security-response-team | nobody | ||
| errata-xmlrpc | 2023-08-11 16:48:14 UTC | Link ID | Red Hat Product Errata RHSA-2023:4623 | |
| Product Security DevOps Team | 2023-08-11 21:13:31 UTC | Status | NEW | CLOSED |
| Resolution | --- | ERRATA | ||
| Last Closed | 2023-08-11 21:13:31 UTC |
Back to bug 2182155