A flaw was found in undertow. This issue makes achieving a denial of service possible due to an unexpected handshake status updated in SslConduit, where the loop never terminates.
CPE | Name | Operator | Version |
---|---|---|---|
io.undertow:undertow-core | lt | 2.2.24.Final | |
io.undertow:undertow-core | lt | 2.3.5.Final |
access.redhat.com/errata/RHSA-2023:1184
access.redhat.com/errata/RHSA-2023:1185
access.redhat.com/errata/RHSA-2023:1512
access.redhat.com/errata/RHSA-2023:1513
access.redhat.com/errata/RHSA-2023:1514
access.redhat.com/errata/RHSA-2023:1516
access.redhat.com/errata/RHSA-2023:2135
access.redhat.com/errata/RHSA-2023:3883
access.redhat.com/errata/RHSA-2023:3884
access.redhat.com/errata/RHSA-2023:3885
access.redhat.com/errata/RHSA-2023:3888
access.redhat.com/errata/RHSA-2023:3892
access.redhat.com/errata/RHSA-2023:3954
access.redhat.com/errata/RHSA-2023:4612
access.redhat.com/security/cve/CVE-2023-1108
bugzilla.redhat.com/show_bug.cgi?id=2174246
github.com/advisories/GHSA-m4mm-pg93-fv78
github.com/undertow-io/undertow/commit/1302c8cf4476936802504efe0d36c58dcd954f78
github.com/undertow-io/undertow/commit/1b763064a41a30583b5df9a118898513007a70be
github.com/undertow-io/undertow/commit/ccc053b55f5de9872bc1a4999fd6aa85fc5e146d
github.com/undertow-io/undertow/pull/1457
nvd.nist.gov/vuln/detail/CVE-2023-1108
security.netapp.com/advisory/ntap-20231020-0002