A flaw was found in Undertow that tripped the client-side invocation timeout with certain calls made over HTTP2. This flaw allows an attacker to carry out denial of service attacks.
{
"unresolved_ranges": [
{
"cpe": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.3:*:*:*:*:*:*:*",
"source": "CPE_FIELD",
"extracted_events": [
{
"last_affected": "7.3"
}
]
},
{
"cpe": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.4:*:*:*:*:*:*:*",
"source": "CPE_FIELD",
"extracted_events": [
{
"last_affected": "7.4"
}
]
},
{
"cpe": "cpe:2.3:a:redhat:single_sign-on:7.4.10:*:*:*:*:*:*:*",
"source": "CPE_FIELD",
"extracted_events": [
{
"last_affected": "7.4.10"
}
]
},
{
"cpe": "cpe:2.3:a:redhat:single_sign-on:7.5.1:*:*:*:*:*:*:*",
"source": "CPE_FIELD",
"extracted_events": [
{
"last_affected": "7.5.1"
}
]
}
]
}{
"cpe": "cpe:2.3:a:redhat:undertow:*:*:*:*:*:*:*:*",
"source": [
"CPE_FIELD",
"REFERENCES"
],
"extracted_events": [
{
"introduced": "0"
},
{
"fixed": "2.2.15"
}
]
}"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2021-3859.json"
"2026-04-12T01:57:51Z"
[
{
"deprecated": false,
"signature_type": "Line",
"digest": {
"line_hashes": [
"37843366493750751742619379260952401598",
"7440480657494467487553469539626601166",
"276016304061374303955031587394107556688",
"33025093169843178057269548979765714246",
"73007699941547598036833828651447045206",
"281097977987362871672003164118742789719",
"219130153540905508636829466680708263762",
"15958409315759019669908654030384320735"
],
"threshold": 0.9
},
"target": {
"file": "core/src/main/java/io/undertow/protocols/http2/HpackEncoder.java"
},
"source": "https://github.com/undertow-io/undertow/commit/e43f0ada3f4da6e8579e0020cec3cb1a81e487c2",
"signature_version": "v1",
"id": "CVE-2021-3859-137c9e03"
},
{
"deprecated": false,
"signature_type": "Line",
"digest": {
"line_hashes": [
"278718351439749032103358072259880297915",
"217996040743920694930878954795178553663",
"194636829920015321065860618077163562720",
"272077580847901113784842885408509213057",
"335496155086488876403469198514903259863",
"93657172332355147865052391949714358868",
"10177502587792283635465765649640402178",
"6822285975597295230959649532656960108",
"2961991051668216914488364019458986316",
"271247688705289436524263595311819397500"
],
"threshold": 0.9
},
"target": {
"file": "core/src/main/java/io/undertow/protocols/http2/Http2Channel.java"
},
"source": "https://github.com/undertow-io/undertow/commit/e43f0ada3f4da6e8579e0020cec3cb1a81e487c2",
"signature_version": "v1",
"id": "CVE-2021-3859-80ae0061"
},
{
"deprecated": false,
"signature_type": "Function",
"digest": {
"function_hash": "197540148066880075987836166995993802539",
"length": 2626.0
},
"target": {
"file": "core/src/main/java/io/undertow/protocols/http2/HpackEncoder.java",
"function": "encode"
},
"source": "https://github.com/undertow-io/undertow/commit/e43f0ada3f4da6e8579e0020cec3cb1a81e487c2",
"signature_version": "v1",
"id": "CVE-2021-3859-a100b2a7"
},
{
"deprecated": false,
"signature_type": "Function",
"digest": {
"function_hash": "291203542927830118324038302489004741089",
"length": 1089.0
},
"target": {
"file": "core/src/main/java/io/undertow/protocols/http2/Http2Channel.java",
"function": "parseFrame"
},
"source": "https://github.com/undertow-io/undertow/commit/e43f0ada3f4da6e8579e0020cec3cb1a81e487c2",
"signature_version": "v1",
"id": "CVE-2021-3859-b0ceb238"
}
]