-
Component Upgrade
-
Resolution: Done
-
Major
-
None
-
None
-
False
-
None
-
False
-
-
-
-
-
-
-
- clones
-
WFCORE-6862 CVE-2024-6162 CVE-2024-27316 Upgrade Undertow to 2.3.14.Final
- Resolved
-
JBEAP-27079 (7.4.z) Upgrade undertow from 2.2.32.SP1-redhat-00001 to 2.2.33.SP1-redhat-00001
- Closed
- incorporates
-
JBEAP-25832 (8.0.z) UNDERTOW-2332 - Requesting deployment overlay may results in ConnectionClosedException
- Closed
-
JBEAP-27063 [GSS](8.0.z) UNDERTOW-2389/2385 - DefaultByteBufferPool leaks buffers for released threads
- Closed
-
JBEAP-26775 [GSS](8.0.z) UNDERTOW-2347 - Undertow client must send either http/1.1 or both http/1.1 and h2 in SSL ClientHello handshake message
- Closed
-
JBEAP-26975 [GSS](8.0.z) UNDERTOW-2351 - NullPointerException on flawed WebSockets war deployment[
- Closed
-
JBEAP-27015 [GSS](8.0.z) UNDERTOW-2383 - Canonicalized query string in redirect location can break included links
- Closed
-
JBEAP-26755 [GSS](8.0.z) UNDERTOW-2354 - Bootstrap$WebSocketListener.contextDestroyed throws NPE after application start up error
- Closed
-
JBEAP-26991 [GSS](8.0.z) UNDERTOW-2378 - Adjust properly session timeout also in case when custom auth mechanisms are used
- Closed
-
JBEAP-26974 (8.0.z) UNDERTOW-2374 - At Http2ReceiveListener.checkRequestHeaders do not check path chars when unescaped characters are allowed
- Closed
- is cloned by
-
JBEAP-26815 (7.4.z) Upgrade undertow from 2.2.30.SP1-redhat-00001 to 2.2.32.SP1-redhat-00001
- Closed
- is duplicated by
-
JBEAP-27075 (8.0.z) Upgrade undertow
- Resolved
- is related to
-
JBEAP-27286 (8.0.z) Upgrade XNIO from 3.8.12.SP2-redhat-00001 to 3.8.16.Final-redhat-00001
- Closed
-
JBEAP-27287 (8.0.z) Upgrade JBoss Remoting from 5.0.27.SP2-redhat-00001 to 5.0.29.Final-redhat-00001
- Closed
- mentioned on