[USN-6994-1] Netty vulnerabilities

Severity High
Affected Packages 1
CVEs 2

Several security issues were fixed in Netty.

It was discovered that Netty did not properly sanitize its input
parameters. A remote attacker could possibly use this issue to cause a
crash. (CVE-2023-34462)

It was discovered that Netty incorrectly handled request cancellation. A
remote attacker could possibly use this issue to cause Netty to consume
resources, leading to a denial of service. (CVE-2023-44487)

Package Affected Version
pkg:deb/ubuntu/libnetty-java?distro=jammy < 4.1.48-4+deb11u2build0.22.04.1
ID
USN-6994-1
Severity
high
Severity from
CVE-2023-44487
URL
https://ubuntu.com/security/notices/USN-6994-1
Published
2024-09-05T20:39:48
(13 days ago)
Modified
2024-09-05T20:39:48
(13 days ago)
Other Advisories
Type Package URL Namespace Name / Product Version Distribution / Platform Arch Patch / Fix
Affected pkg:deb/ubuntu/libnetty-java?distro=jammy ubuntu libnetty-java < 4.1.48-4+deb11u2build0.22.04.1 jammy
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories Exploits PoC Pubblication Date Modification Date
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories PoC Pubblication Date Modification Date
Loading...