[ubuntu/xenial-security] netty-3.9 3.9.0.Final-1ubuntu0.1 (Accepted)
Paulo Flabiano Smorigo
pfsmorigo at canonical.com
Thu Oct 22 17:28:28 UTC 2020
netty-3.9 (3.9.0.Final-1ubuntu0.1) xenial-security; urgency=medium
* Update debian/rules to fix FTBFS
* SECURITY UPDATE: HTTP request smuggling
- debian/patches/0004-CVE-2019-16869.patch: Correctly handle whitespaces in
HTTP header names as defined by RFC7230#section-3.2.4.
- debian/patches/0005-CVE-2019-20444.patch: Detect missing colon when
parsing http headers with no value.
- debian/patches/0006-CVE-2019-20445-1.patch: Verify we do not receive
multiple content-length headers or a content-length and
transfer-encoding: chunked header when using HTTP/1.1.
- debian/patches/0007-CVE-2019-20445-2.patch: Remove "Content-Length" when
decoding HTTP/1.1 message with both "Transfer-Encoding: chunked" and
"Content-Length".
- CVE-2019-16869
- CVE-2019-20444
- CVE-2019-20445
- CVE-2020-7238
Date: 2020-10-21 19:41:21.086524+00:00
Changed-By: Paulo Flabiano Smorigo <pfsmorigo at canonical.com>
https://launchpad.net/ubuntu/+source/netty-3.9/3.9.0.Final-1ubuntu0.1
-------------- next part --------------
Sorry, changesfile not available.
More information about the Xenial-changes
mailing list