A flaw was found in undertow. This issue makes achieving a denial of service possible due to an unexpected handshake status updated in SslConduit, where the loop never terminates.
CPE | Name | Operator | Version |
---|---|---|---|
libfuse | eq | fuse_2_3_0 |
access.redhat.com/errata/RHSA-2023:1184
access.redhat.com/errata/RHSA-2023:1185
access.redhat.com/errata/RHSA-2023:1512
access.redhat.com/errata/RHSA-2023:1513
access.redhat.com/errata/RHSA-2023:1514
access.redhat.com/errata/RHSA-2023:1516
access.redhat.com/errata/RHSA-2023:2135
access.redhat.com/errata/RHSA-2023:3883
access.redhat.com/errata/RHSA-2023:3884
access.redhat.com/errata/RHSA-2023:3885
access.redhat.com/errata/RHSA-2023:3888
access.redhat.com/errata/RHSA-2023:3892
access.redhat.com/errata/RHSA-2023:3954
access.redhat.com/errata/RHSA-2023:4612
access.redhat.com/security/cve/CVE-2023-1108
bugzilla.redhat.com/show_bug.cgi?id=2174246
github.com/advisories/GHSA-m4mm-pg93-fv78
security.netapp.com/advisory/ntap-20231020-0002/