netty 1:4.1.48-6 source package in Debian
Changelog
netty (1:4.1.48-6) unstable; urgency=high * Team upload. * Fix CVE-2021-37136, CVE-2021-37137, CVE-2021-43797, CVE-2022-41881, and CVE-2022-41915. Several out-of-memory, stack overflow or HTTP request smuggling vulnerabilities have been discovered in Netty which may allow attackers to cause a denial of service or bypass restrictions when used as a proxy. (Closes: #1027180, #1014769, #1001437) -- Markus Koschany <email address hidden> Sun, 01 Jan 2023 19:17:21 +0100
Upload details
- Uploaded by:
- Debian Java Maintainers
- Uploaded to:
- Sid
- Original maintainer:
- Debian Java Maintainers
- Architectures:
- all
- Section:
- java
- Urgency:
- Very Urgent
See full publishing history Publishing
Series | Published | Component | Section |
---|
Builds
Downloads
File | Size | SHA-256 Checksum |
---|---|---|
netty_4.1.48-6.dsc | 2.5 KiB | 3938733395b97e671f9cb5d7dbb6b85e2b7ce0782cbfe5e79daed4199e269159 |
netty_4.1.48.orig.tar.xz | 1.6 MiB | e5351d821f461f64af58e89f260ad8943b0ab75f26c1a845300a91f22a711600 |
netty_4.1.48-6.debian.tar.xz | 32.6 KiB | faccf5c61ff9ea5ae8d287cdbf8c14f8bd1e35e038d40d149a1ac0e1563f7cdc |
Available diffs
- diff from 1:4.1.48-5 to 1:4.1.48-6 (11.3 KiB)
No changes file available.