Back to bug 2224245
| Who | When | What | Removed | Added |
|---|---|---|---|---|
| Vipul Nair | 2023-07-20 09:44:40 UTC | Blocks | 2220974 | |
| Vipul Nair | 2023-07-20 09:52:09 UTC | Summary | CVE-2023-37788 goproxy: Denial of service (DoS) via unspecified vectors. | TRIAGE-CVE-2023-37788 goproxy: Denial of service (DoS) via unspecified vectors. |
| Alias | CVE-2023-37788 | TRIAGE-CVE-2023-37788 | ||
| Vipul Nair | 2023-07-20 09:52:24 UTC | CC | aazores, amasferr, amctagga, aveerama, bdettelb, chazlett, dhughes, dsimansk, dymurray, eaguilar, ebaron, eglynn, ellin, gparvin, ibolton, jcantril, jjoyce, jkang, jkoehler, jkurik, jmatthew, jmontleo, joelsmith, jpallich, lball, lgamliel, lhh, matzew, mburns, mfilanov, mgarciac, mkudlej, muagarwa, mwringe, nathans, nbecker, njean, nobody, ocs-bugs, owatkins, pahickey, pcpbot, periklis, pgrist, pjindal, rfreiman, rgarg, rhos-maint, rhuss, scorneli, scox, sfroberg, shbose, skontopo, slucidi, sseago, stcannon, teagle, tjochec, tnielsen, ubhargav | |
| Vipul Nair | 2023-07-20 09:57:46 UTC | CC | dfreiber, jburrell, rogbas, vkumar | |
| Vipul Nair | 2023-07-20 11:12:00 UTC | Depends On | 2224306, 2224304, 2224302, 2224305, 2224303, 2224301, 2224299, 2224298, 2224307, 2224308, 2224300 | |
| Vipul Nair | 2023-07-20 11:42:40 UTC | Depends On | 2224315, 2224314 | |
| Vipul Nair | 2023-07-20 11:52:17 UTC | Depends On | 2224317, 2224316 | |
| Vipul Nair | 2023-07-20 12:12:27 UTC | Depends On | 2224322 | |
| Avinash Hanwate | 2023-07-24 05:38:27 UTC | Summary | TRIAGE-CVE-2023-37788 goproxy: Denial of service (DoS) via unspecified vectors. | CVE-2023-37788 goproxy: Denial of service (DoS) via unspecified vectors. |
| Alias | TRIAGE-CVE-2023-37788 | CVE-2023-37788 | ||
| Avinash Hanwate | 2023-07-25 04:43:16 UTC | Depends On | 2225359 | |
| Red Hat Bugzilla | 2023-08-03 08:31:11 UTC | CC | ocs-bugs | |
| Avinash Hanwate | 2023-08-17 07:19:34 UTC | Doc Text | goproxy is vulnerable to a denial of service, caused by improper input validation. By sending a specially crafted HTTP request to HTTPS page replaced path the "/" with asterix "*", a remote attacker could exploit this vulnerability to cause goproxy server to crash. | |
| RaTasha Tillery-Smith | 2023-08-17 12:35:43 UTC | Doc Text | goproxy is vulnerable to a denial of service, caused by improper input validation. By sending a specially crafted HTTP request to HTTPS page replaced path the "/" with asterix "*", a remote attacker could exploit this vulnerability to cause goproxy server to crash. | A flaw was found in goproxy, which is vulnerable to a denial of service caused by improper input validation. This flaw allows a remote attacker can cause the goproxy server to crash by sending a specially crafted HTTP request to the HTTPS page, replacing the path "/" with an asterisk "*". |
Back to bug 2224245