First published: Thu Sep 05 2024(Updated: )
It was discovered that Netty did not properly sanitize its input parameters. A remote attacker could possibly use this issue to cause a crash. (CVE-2023-34462) It was discovered that Netty incorrectly handled request cancellation. A remote attacker could possibly use this issue to cause Netty to consume resources, leading to a denial of service. (CVE-2023-44487)
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/libnetty-java | <1:4.1.48-4+deb11u2build0.22.04.1 | 1:4.1.48-4+deb11u2build0.22.04.1 |
Ubuntu Ubuntu | =22.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.