drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Zwei Probleme in Netty
| Name: |
Zwei Probleme in Netty |
|
| ID: |
USN-7284-1 |
|
| Distribution: |
Ubuntu |
|
| Plattformen: |
Ubuntu 16.04 LTS, Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, Ubuntu 22.04 LTS, Ubuntu 24.04 LTS, Ubuntu 24.10 |
|
| Datum: |
Mo, 24. Februar 2025, 06:56 |
|
| Referenzen: |
https://www.cve.org/CVERecord?id=CVE-2024-29025
https://www.cve.org/CVERecord?id=CVE-2022-24823 |
|
| Applikationen: |
Netty |
|
Originalnachricht |
This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --===============5271120420496339114== Content-Language: en-US Content-Type: multipart/signed; micalg=pgp-sha256; protocol="application/pgp-signature"; boundary="------------QiODaMUkk2O32CsC9hYSe4rq"
This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --------------QiODaMUkk2O32CsC9hYSe4rq Content-Type: multipart/mixed; boundary="------------YBihFxuaCbHTS2Om2Gg8L22I"; protected-headers="v1" From: Bruce Cable <bruce.cable@canonical.com> Reply-To: Ubuntu Security <security@ubuntu.com> To: ubuntu-security-announce@lists.ubuntu.com Message-ID: <465401f7-1212-44bc-a056-ba32d062b8d3@canonical.com> Subject: [USN-7284-1] Netty vulnerabilities
--------------YBihFxuaCbHTS2Om2Gg8L22I Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: base64
========================================================================== Ubuntu Security Notice USN-7284-1 February 24, 2025
netty vulnerabilities ==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 24.10 - Ubuntu 24.04 LTS - Ubuntu 22.04 LTS - Ubuntu 20.04 LTS - Ubuntu 18.04 LTS - Ubuntu 16.04 LTS
Summary:
Several security issues were fixed in Netty.
Software Description: - netty: Java NIO client/server socket framework
Details:
Jonathan Leitschuh discovered that Netty did not correctly handle file permissions when writing temporary files. An attacker could possibly use this issue to leak sensitive information. (CVE-2022-24823)
It was discovered that Netty did not correctly handle limiting the number of fields when decoding a HTTP request. An attacker could possibly use issue to cause a denial of service. This issue only affected Ubuntu 16.04 LTS, Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, Ubuntu 22.04 LTS and Ubuntu 24.04 LTS. (CVE-2024-29025)
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 24.10 libnetty-java 1:4.1.48-10ubuntu0.1
Ubuntu 24.04 LTS libnetty-java 1:4.1.48-9ubuntu0.1~esm1 Available with Ubuntu Pro
Ubuntu 22.04 LTS libnetty-java 1:4.1.48-4+deb11u2ubuntu0.1~esm1 Available with Ubuntu Pro
Ubuntu 20.04 LTS libnetty-java 1:4.1.45-1ubuntu0.1~esm2 Available with Ubuntu Pro
Ubuntu 18.04 LTS libnetty-java 1:4.1.7-4ubuntu0.1+esm3 Available with Ubuntu Pro
Ubuntu 16.04 LTS libnetty-java 1:4.0.34-1ubuntu0.1~esm2 Available with Ubuntu Pro
In general, a standard system update will make all the necessary changes.
References: https://ubuntu.com/security/notices/USN-7284-1 CVE-2022-24823, CVE-2024-29025
Package Information: https://launchpad.net/ubuntu/+source/netty/1:4.1.48-10ubuntu0.1
--------------YBihFxuaCbHTS2Om2Gg8L22I--
--------------QiODaMUkk2O32CsC9hYSe4rq Content-Type: application/pgp-signature; name="OpenPGP_signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="OpenPGP_signature.asc"
-----BEGIN PGP SIGNATURE-----
wsD5BAABCAAjFiEEkd98mdFcnQdP7vQkuGrtzot7pOcFAme75IYFAwAAAAAACgkQuGrtzot7pOeC JQwAhK1x0YMOuShfKzef2nle/WSNUZVz+80C/XaNDG9+B9HbasaeJGd+HvRj7PiRft5+VL1H40oV toiRrnrsFrwdkIct5SQcHsUFtRvWEWKlETL7MriY7MaTDLdQjagBqQsU/9yswFUbo/RVmNxA6UZx S8lb4/UPQAChyrC9C2x30ls+LqZDJwj5rJahA8RRzXzcthlUoMJRLq065mMU4P/eFr759GXHzoFP FOfGS6kx25ypoTtge8MHGU8tV7rvPcb8QGs3QND2SOH41CUqZursBkPSTfz+NxrKzOinjtTOkqUo johJowC14b0+34D3WJvMbpRIKBijLLKuLEmQHdFveQY6WCIJC0z2fYpszZpySBfJxxIW+OiRO3DR vGIoZc3x3KdnYGxS9wcPk7wg7uDUIz62gjbi46y2zuqI4c4YU0zpFckpJarPxJpjEKRMXna9UHyA UN2kU/L8Oq4zNDAv+nmCdidtysxldLKsnE2SCtTugfrsnZ5rfYh3m/U0PWNe =yKsT -----END PGP SIGNATURE-----
--------------QiODaMUkk2O32CsC9hYSe4rq--
--===============5271120420496339114== Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: base64 Content-Disposition: inline
Cg==
--===============5271120420496339114==--
|
|
|
|