[ubuntu/bionic-updates] netty 1:4.1.7-4ubuntu0.1 (Accepted)
Ubuntu Archive Robot
cjwatson+ubuntu-archive-robot at chiark.greenend.org.uk
Thu Feb 18 21:28:12 UTC 2021
netty (1:4.1.7-4ubuntu0.1) bionic-security; urgency=medium
* SECURITY UPDATE: HTTP request smuggling
HTTP header names as defined by RFC7230#section-3.2.4.
- debian/patches/0005-CVE-2019-20444.patch: Detect missing colon when
parsing http headers with no value.
- debian/patches/0006-CVE-2019-20445-1.patch: Verify we do not receive
multiple content-length headers or a content-length and
transfer-encoding: chunked header when using HTTP/1.1.
- debian/patches/0007-CVE-2019-20445-2.patch: Remove "Content-Length" when
decoding HTTP/1.1 message with both "Transfer-Encoding: chunked" and
"Content-Length".
- debian/patches/18-CVE-2019-20445-3.patch: Added tests for
Transfer-Encoding header with whitespace.
- CVE-2019-20444
- CVE-2019-20445
* SECURITY UPDATE: Memory buffer out of bounds
- debian/patches/19-CVE-2020-11612.patch: Allow a limit to be set on the
decompressed buffer size for ZlibDecoders.
- CVE-2020-11612
Date: 2021-02-18 19:52:14.787451+00:00
Changed-By: Paulo Flabiano Smorigo <pfsmorigo at canonical.com>
Signed-By: Ubuntu Archive Robot <cjwatson+ubuntu-archive-robot at chiark.greenend.org.uk>
https://launchpad.net/ubuntu/+source/netty/1:4.1.7-4ubuntu0.1
-------------- next part --------------
Sorry, changesfile not available.
More information about the Bionic-changes
mailing list