[ 
https://issues.apache.org/jira/browse/ZOOKEEPER-2450?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Michael Han resolved ZOOKEEPER-2450.
------------------------------------
    Resolution: Fixed

Patch was committed as part of ZOOKEEPER-2423:
http://svn.apache.org/viewvc?view=revision&revision=1742474
http://svn.apache.org/viewvc?view=revision&revision=1742473

Close as resolved.

> Upgrade Netty version due to security vulnerability (CVE-2014-3488)
> -------------------------------------------------------------------
>
>                 Key: ZOOKEEPER-2450
>                 URL: https://issues.apache.org/jira/browse/ZOOKEEPER-2450
>             Project: ZooKeeper
>          Issue Type: Bug
>          Components: security, server
>    Affects Versions: 3.4.8, 3.5.1, 3.6.0
>            Reporter: Michael Han
>            Assignee: Michael Han
>            Priority: Critical
>             Fix For: 3.4.9, 3.5.2, 3.6.0
>
>
> This JIRA recreates ZOOKEEPER-2432 which was deleted as the collateral damage 
> during the spamming fighting effort Apache Infrastructure Team did weeks ago. 
> Recreate the JIRA for the record so external documentations can link back to 
> this JIRA.
> The SslHandler in Netty before 3.9.2 allows remote attackers to cause a 
> denial of service (infinite loop and CPU consumption) via a crafted 
> SSLv2Hello message [1]. We are using netty 3.7.x in ZK for 3.4/3.5/3.6, which 
> is affected by this vulnerability.
> [1] http://cve.mitre.org/cgi-bin/cvename.cgi?name=2014-3488
> [2] http://netty.io/news/



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)

Reply via email to