First published: Tue Nov 12 2024(Updated: )
Netty is an asynchronous event-driven network application framework for rapid development of maintainable high performance protocol servers & clients. An unsafe reading of environment file could potentially cause a denial of service in Netty. When loaded on an Windows application, Netty attempts to load a file that does not exist. If an attacker creates such a large file, the Netty application crashes. This vulnerability is fixed in 4.1.115.
Affected Software | Affected Version | How to fix |
---|---|---|
NettyRPC | <4.1.115 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-2325538 is categorized as potentially high due to the risk of denial of service.
To fix REDHAT-BUG-2325538, update Netty to a version greater than 4.1.115.
REDHAT-BUG-2325538 affects Windows applications using the Netty framework prior to version 4.1.115.
Exploitation of REDHAT-BUG-2325538 can lead to a denial of service condition in applications utilizing Netty.
The maintainers of affected software are responsible for addressing and patching the vulnerability identified by REDHAT-BUG-2325538.