netty 1:4.1.48-6 source package in Debian

Changelog

netty (1:4.1.48-6) unstable; urgency=high

  * Team upload.
  * Fix CVE-2021-37136, CVE-2021-37137, CVE-2021-43797, CVE-2022-41881,
    and CVE-2022-41915. Several out-of-memory, stack overflow or HTTP request
    smuggling vulnerabilities have been discovered in Netty which may allow
    attackers to cause a denial of service or bypass restrictions when used as
    a proxy. (Closes: #1027180, #1014769, #1001437)

 -- Markus Koschany <email address hidden>  Sun, 01 Jan 2023 19:17:21 +0100

Upload details

Uploaded by:
Debian Java Maintainers
Uploaded to:
Sid
Original maintainer:
Debian Java Maintainers
Architectures:
all
Section:
java
Urgency:
Very Urgent

See full publishing history Publishing

Series Pocket Published Component Section

Builds

Downloads

File Size SHA-256 Checksum
netty_4.1.48-6.dsc 2.5 KiB 3938733395b97e671f9cb5d7dbb6b85e2b7ce0782cbfe5e79daed4199e269159
netty_4.1.48.orig.tar.xz 1.6 MiB e5351d821f461f64af58e89f260ad8943b0ab75f26c1a845300a91f22a711600
netty_4.1.48-6.debian.tar.xz 32.6 KiB faccf5c61ff9ea5ae8d287cdbf8c14f8bd1e35e038d40d149a1ac0e1563f7cdc

Available diffs

No changes file available.

Binary packages built by this source