A flaw was found in Undertow that tripped the client-side invocation timeout with certain calls made over HTTP2. This flaw allows an attacker to carry out denial of service attacks.
A process is invoked with sensitive command-line arguments, environment variables, or other elements that can be seen by other processes on the operating system.
The product exposes a resource to the wrong control sphere, providing unintended actors with inappropriate access to the resource.
Link | Tags |
---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=2010378 | issue tracking vendor advisory |
https://issues.redhat.com/browse/UNDERTOW-1979 | issue tracking patch vendor advisory |
https://github.com/undertow-io/undertow/pull/1296 | third party advisory |
https://github.com/undertow-io/undertow/commit/e43f0ada3f4da6e8579e0020cec3cb1a81e487c2 | third party advisory patch |
https://access.redhat.com/security/cve/CVE-2021-3859 | vendor advisory |
https://security.netapp.com/advisory/ntap-20221201-0004/ | third party advisory |