USN-4600-2

Source
https://ubuntu.com/security/notices/USN-4600-2
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-4600-2.json
JSON Data
https://api.osv.dev/v1/vulns/USN-4600-2
Related
Published
2020-10-27T13:40:49.381058Z
Modified
2020-10-27T13:40:49.381058Z
Summary
netty vulnerabilities
Details

USN-4600-1 fixed multiple vunerabilities in Netty 3.9. This update provides the corresponding fixes for CVE-2019-20444, CVE-2019-20445 for Netty.

Also it was discovered that Netty allow for unbounded memory allocation. A remote attacker could send a large stream to the Netty server causing it to crash (denial of service). (CVE-2020-11612)

Original advisory details:

It was discovered that Netty had HTTP request smuggling vulnerabilities. A remote attacker could used it to extract sensitive information. (CVE-2019-16869, CVE-2019-20444, CVE-2019-20445, CVE-2020-7238)

References

Affected packages

Ubuntu:18.04:LTS / netty

Package

Name
netty
Purl
pkg:deb/ubuntu/netty?arch=src?distro=bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1:4.1.7-4ubuntu0.1

Affected versions

1:4.*

1:4.1.7-4

Ecosystem specific

{
    "availability": "No subscription required",
    "binaries": [
        {
            "binary_version": "1:4.1.7-4ubuntu0.1",
            "binary_name": "libnetty-java"
        }
    ]
}