Update dependency io.undertow:undertow-core to v2.3.14.Final [SECURITY] #553
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
This PR contains the following updates:
2.2.20.Final
->2.3.14.Final
GitHub Vulnerability Alerts
CVE-2022-4492
The undertow client is not checking the server identity presented by the server certificate in https connections. This should be performed by default in https and in http/2.
CVE-2023-1108
A flaw was found in undertow. This issue makes achieving a denial of service possible due to an unexpected handshake status updated in SslConduit, where the loop never terminates.
CVE-2024-1459
A path traversal vulnerability was found in Undertow. This issue may allow a remote attacker to append a specially-crafted sequence to an HTTP request for an application deployed to JBoss EAP, which may permit access to privileged or restricted files and directories.
CVE-2024-6162
A vulnerability was found in Undertow. URL-encoded request path information can be broken for concurrent requests on ajp-listener, causing the wrong path to be processed and resulting in a possible denial of service.
Release Notes
undertow-io/undertow (io.undertow:undertow-core)
v2.3.14.Final
Compare Source
Includes CVES: CVE-2024-6162 CVE-2024-27316 CVE-2023-5685
Sub-task
Bug
Component Upgrade
Enhancement
v2.3.13.Final
Compare Source
v2.3.12.Final
Compare Source
v2.3.11.Final
Compare Source
v2.3.10.Final
Compare Source
v2.3.9.Final
Compare Source
v2.3.8.Final
Compare Source
v2.3.7.Final
Compare Source
v2.3.6.Final
Compare Source
v2.3.5.Final
Compare Source
v2.3.4.Final
Compare Source
v2.3.3.Final
Compare Source
v2.3.2.Final
Compare Source
v2.3.1.Final
Compare Source
v2.3.0.Final
Compare Source
v2.2.32.Final
Compare Source
v2.2.31.Final
Compare Source
v2.2.30.Final
Compare Source
v2.2.29.Final
Compare Source
v2.2.28.Final
Compare Source
v2.2.27.Final
Compare Source
v2.2.26.Final
Compare Source
v2.2.25.Final
Compare Source
v2.2.24.Final
Compare Source
v2.2.23.Final
Compare Source
v2.2.22.Final
Compare Source
v2.2.21.Final
Compare Source
Configuration
📅 Schedule: Branch creation - "" (UTC), Automerge - At any time (no schedule defined).
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
This PR has been generated by Mend Renovate. View repository job log here.