HTTP/2 (including DNS over HTTPS) contains a design flaw and is vulnerable to "MadeYouReset" DoS attack through HTTP/2 control frames
This issue has been addressed in the following products: Red Hat build of Apache Camel 4.10.6 for Spring Boot 3.4.9 Via RHSA-2025:14911 https://access.redhat.com/errata/RHSA-2025:14911
This issue has been addressed in the following products: OCP-Tools-4.18-RHEL-9 Via RHSA-2025:16455 https://access.redhat.com/errata/RHSA-2025:16455
This issue has been addressed in the following products: OCP-Tools-4.19-RHEL-9 Via RHSA-2025:16454 https://access.redhat.com/errata/RHSA-2025:16454
This issue has been addressed in the following products: OCP-Tools-4.17-RHEL-9 Via RHSA-2025:16456 https://access.redhat.com/errata/RHSA-2025:16456
This issue has been addressed in the following products: OCP-Tools-4.16-RHEL-9 Via RHSA-2025:16457 https://access.redhat.com/errata/RHSA-2025:16457
This issue has been addressed in the following products: OCP-Tools-4.12-RHEL-8 Via RHSA-2025:16459 https://access.redhat.com/errata/RHSA-2025:16459
This issue has been addressed in the following products: OCP-Tools-4.13-RHEL-8 Via RHSA-2025:16460 https://access.redhat.com/errata/RHSA-2025:16460
This issue has been addressed in the following products: OCP-Tools-4.14-RHEL-8 Via RHSA-2025:16461 https://access.redhat.com/errata/RHSA-2025:16461
This issue has been addressed in the following products: OCP-Tools-4.15-RHEL-8 Via RHSA-2025:16462 https://access.redhat.com/errata/RHSA-2025:16462
This issue has been addressed in the following products: Red Hat AMQ Broker 7.13.2 Via RHSA-2025:17567 https://access.redhat.com/errata/RHSA-2025:17567