Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

🔐 CVE-2024-29025: io.netty:netty-codec-http:jar:4.1.107.Final:test #54

Closed
github-actions bot opened this issue Mar 27, 2024 · 0 comments · Fixed by #55
Closed

🔐 CVE-2024-29025: io.netty:netty-codec-http:jar:4.1.107.Final:test #54

github-actions bot opened this issue Mar 27, 2024 · 0 comments · Fixed by #55
Assignees
Labels
security Security related change

Comments

@github-actions
Copy link

Summary

Netty is an asynchronous event-driven network application framework for rapid development of maintainable high performance protocol servers & clients. The HttpPostRequestDecoder can be tricked to accumulate data. While the decoder can store items on the disk if configured so, there are no limits to the number of fields the form can have, an attacher can send a chunked post consisting of many small fields that will be accumulated in the bodyListHttpData list. The decoder cumulates bytes in the undecodedChunk buffer until it can decode a field, this field can cumulate data without limits. This vulnerability is fixed in 4.1.108.Final.

CVE: CVE-2024-29025
CWE: CWE-770

References

@github-actions github-actions bot added the security Security related change label Mar 27, 2024
@pj-spoelders pj-spoelders self-assigned this Apr 9, 2024
pj-spoelders added a commit that referenced this issue Apr 10, 2024
pj-spoelders added a commit that referenced this issue Apr 11, 2024
* #54 : CVE-2024-29025

* undo scala-library version upgrade
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
security Security related change
Projects
None yet
Development

Successfully merging a pull request may close this issue.

1 participant