io.netty:netty-common@4.1.27.Final vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the io.netty:netty-common package. This does not include vulnerabilities belonging to this package’s dependencies.

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for free
Vulnerability Vulnerable Version
  • M
Denial of Service (DoS)

Affected versions of this package are vulnerable to Denial of Service (DoS) due to the extraneous reading of a Linux environment file when loaded on a Windows application. An attacker can cause the application to crash by creating a large file in C:\etc\os-release or C:\usr\lib\os-release which the application attempts to load. If the file exceeds the JVM's memory limit (1 GB by default) the application will crash when loading it into memory.

Note: This vulnerability affects only Windows environments.

How to fix Denial of Service (DoS)?

Upgrade io.netty:netty-common to version 4.1.115.Final or higher.

[,4.1.115.Final)
  • M
Information Exposure

Affected versions of this package are vulnerable to Information Exposure due to an incomplete fix to CVE-2021-21290, which still allowed one exploitable path. When netty's multipart decoders are used, local information disclosure can occur via the local system temporary directory, if temporary storing uploads on the disk is enabled. Note: To be vulnerable, a victim application has to run on a Unix-like operating system, and with Java 6 or below.

How to fix Information Exposure?

Upgrade io.netty:netty-common to version 4.1.77.Final or higher.

[4.0.0.Final,4.1.77.Final)
  • M
Information Disclosure

Affected versions of this package are vulnerable to Information Disclosure via the AbstractDiskHttpData method, and on Unix-like systems.

When netty's multipart decoders are used, local information disclosure can occur via the local system temporary directory if temporary storing uploads on the disk are enabled. On unix-like systems, the temporary directory is shared between all users. As such, writing to this directory using API's that do not explicitly set the file/directory permissions can lead to information disclosure. The method File.createTempFile on unix-like systems creates a random file, but, by default will create this file with the permissions -rw-r--r--. Sensitive information is written to this file in AbstractDiskHttpData, and other local users can read it.

How to fix Information Disclosure?

Upgrade io.netty:netty-common to version 4.1.59.Final or higher.

[4.0.0.Final,4.1.59.Final)