WCM RnD created ZOOKEEPER-4405: ---------------------------------- Summary: High Security issues reported with Netty library bundled in ZooKeeper 3.6.3 and 3.7 Key: ZOOKEEPER-4405 URL: https://issues.apache.org/jira/browse/ZOOKEEPER-4405 Project: ZooKeeper Issue Type: Bug Affects Versions: 3.7.0, 3.6.3 Reporter: WCM RnD
Netty library used in ZooKeeper has the below high security vulnerabilities reported. h2. BDSA-2021-2832 *Affected Component(s):* Netty Project *Vulnerability Published:* 2021-09-23 06:15 EDT *Vulnerability Updated:* 2021-09-23 06:15 EDT *CVSS Score:* 6.5 (overall), {color:#FF0000}7.5{color} (base) *Summary*: Netty is vulnerable to excessive memory usage due to being unable to set size restrictions on decompressed data input. An attacker could exploit this by supplying crafted input in order to cause a denial-of-service (DoS). *Solution*: Fixed in version netty-4.1.68.Final h2. BDSA-2021-2831 *Affected Component(s):* Netty Project *Vulnerability Published:* 2021-09-22 07:35 EDT *Vulnerability Updated:* 2021-09-22 07:35 EDT *CVSS Score:* 6.5 (overall), {color:#FF0000}7.5{color} (base) *Summary*: Netty is susceptible to excessive memory usage due to missing chunk length restrictions and the potential buffering of reserved skippable chunks until the complete chunk has been received. An attacker could exploit this by supplying crafted input in order to cause a denial-of-service (DoS). *Solution*: Fixed in version netty-4.1.68.Final Request to update the library to netty-4.1.68.Final where the vulnerability is fixed. -- This message was sent by Atlassian Jira (v8.3.4#803005)