4.1.117.Final
12 years ago
1 months ago
Known vulnerabilities in the io.netty:netty-common package. This does not include vulnerabilities belonging to this package’s dependencies.
Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for freeVulnerability | Vulnerable Version |
---|---|
Affected versions of this package are vulnerable to Improper Validation of Specified Quantity in Input in Note: This vulnerability affects only Windows environments and is a bypass for the previously reported and fixed CVE-2024-47535. How to fix Improper Validation of Specified Quantity in Input? Upgrade | [,4.1.118)[4.2.0.Alpha1,4.2.0.RC3) |
Affected versions of this package are vulnerable to Denial of Service (DoS) due to the extraneous reading of a Linux environment file when loaded on a Windows application. An attacker can cause the application to crash by creating a large file in Note: This vulnerability affects only Windows environments. How to fix Denial of Service (DoS)? Upgrade | [,4.1.115.Final) |
Affected versions of this package are vulnerable to Information Exposure due to an incomplete fix to CVE-2021-21290, which still allowed one exploitable path. When netty's multipart decoders are used, local information disclosure can occur via the local system temporary directory, if temporary storing uploads on the disk is enabled. Note: To be vulnerable, a victim application has to run on a Unix-like operating system, and with Java 6 or below. How to fix Information Exposure? Upgrade | [4.0.0.Final,4.1.77.Final) |