SUSE-SU-2022:3617-1

See a problem?
Import Source
https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2022:3617-1.json
JSON Data
https://api.osv.dev/v1/vulns/SUSE-SU-2022:3617-1
Related
Published
2022-10-18T11:28:54Z
Modified
2022-10-18T11:28:54Z
Summary
Security update for netty
Details

This update for netty fixes the following issues:

  • CVE-2020-11612: The ZlibDecoders allow for unbounded memory allocation while decoding a byte stream (bsc#1168932)
  • CVE-2021-21290: Information disclosure via the local system temporary directory (bsc#1182103)
  • CVE-2021-37136: Bzip2Decoder doesn't allow setting size restrictions for decompressed data (bsc#1190610)
  • CVE-2021-37137: Snappy frame decoder doesn't restrict the chunk length and may buffer skippable chunks (bsc#1190613)
References

Affected packages

SUSE:Manager Server Module 4.2 / netty

Package

Name
netty
Purl
purl:rpm/suse/netty&distro=SUSE%20Manager%20Server%20Module%204.2

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.1.44.Final-150300.4.3.2

Ecosystem specific

{
    "binaries": [
        {
            "netty": "4.1.44.Final-150300.4.3.2"
        }
    ]
}