Back to bug 2182156
| Who | When | What | Removed | Added |
|---|---|---|---|---|
| Anten Skrabec | 2023-03-27 17:42:33 UTC | CC | security-response-team | |
| Anten Skrabec | 2023-03-27 17:43:00 UTC | Blocks | 2178208 | |
| Paige Jung | 2023-03-27 17:47:38 UTC | Doc Text | An attacker could bypass authentication checks when ext_authz is used by crafting a malicious http header with a non-UTF8 value. | A flaw was found in Envoy. This issue could allow an attacker to bypass authentication checks when ext_authz is used by crafting a malicious http header with a non-UTF8 value. |
| Pedro Sampaio | 2023-04-04 21:03:24 UTC | Group | security, qe_staff | |
| Summary | EMBARGOED CVE-2023-27488 envoy: gRPC client produces invalid protobuf when an HTTP header with non-UTF8 value is received | CVE-2023-27488 envoy: gRPC client produces invalid protobuf when an HTTP header with non-UTF8 value is received | ||
| Deadline | 2023-04-04 | |||
| Red Hat Bugzilla | 2023-07-07 08:31:31 UTC | CC | security-response-team | |
| Assignee | security-response-team | nobody | ||
| errata-xmlrpc | 2023-08-11 16:48:14 UTC | Link ID | Red Hat Product Errata RHSA-2023:4623 | |
| Product Security DevOps Team | 2023-08-11 21:14:30 UTC | Status | NEW | CLOSED |
| Resolution | --- | ERRATA | ||
| Last Closed | 2023-08-11 21:14:30 UTC |
Back to bug 2182156