io.netty:netty-common@4.1.112.Final vulnerabilities

  • latest version

    4.1.117.Final

  • latest non vulnerable version

  • first published

    12 years ago

  • latest version published

    1 months ago

  • licenses detected

  • package manager

  • Direct Vulnerabilities

    Known vulnerabilities in the io.netty:netty-common package. This does not include vulnerabilities belonging to this package’s dependencies.

    How to fix?

    Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

    Fix for free
    VulnerabilityVulnerable Version
    • M
    Improper Validation of Specified Quantity in Input

    Affected versions of this package are vulnerable to Improper Validation of Specified Quantity in Input in BufferedReader.readLine(), which does not count null bytes when calculating the acceptable size of an input stream. An attacker can cause the application to crash by creating a large file in C:\etc\os-release or C:\usr\lib\os-release which the application attempts to load. If the file exceeds the JVM's memory limit (1 GB by default) the application will crash when loading it into memory.

    Note: This vulnerability affects only Windows environments and is a bypass for the previously reported and fixed CVE-2024-47535.

    How to fix Improper Validation of Specified Quantity in Input?

    Upgrade io.netty:netty-common to version 4.1.118, 4.2.0.RC3 or higher.

    [,4.1.118)[4.2.0.Alpha1,4.2.0.RC3)
    • M
    Denial of Service (DoS)

    Affected versions of this package are vulnerable to Denial of Service (DoS) due to the extraneous reading of a Linux environment file when loaded on a Windows application. An attacker can cause the application to crash by creating a large file in C:\etc\os-release or C:\usr\lib\os-release which the application attempts to load. If the file exceeds the JVM's memory limit (1 GB by default) the application will crash when loading it into memory.

    Note: This vulnerability affects only Windows environments.

    How to fix Denial of Service (DoS)?

    Upgrade io.netty:netty-common to version 4.1.115.Final or higher.

    [,4.1.115.Final)