Andrei Dulceanu created OAK-10591:
-------------------------------------

             Summary: CLONE - Bump netty dependency from 4.1.52.Final to 
4.1.66.Final
                 Key: OAK-10591
                 URL: https://issues.apache.org/jira/browse/OAK-10591
             Project: Jackrabbit Oak
          Issue Type: Task
          Components: segment-tar
            Reporter: Arun Kumar Ram
            Assignee: Andrei Dulceanu
             Fix For: 1.42.0, 1.22.9


io.netty : netty-codec : 4.1.52.Final sonatype-2021-0789

*Summary*:
 sonatype-2021-0789
 Explanation
 The netty-codec package contains a Buffer Overflow vulnerability. The 
finishEncode function in the Lz4FrameEncoder.class class incorrectly estimates 
the buffer size when writing a footer for the last header. An attacker could 
abuse this behavior by sending a payload to the flawed application that will 
overwrite contiguous memory chunks in the heap, resulting in a Denial of 
Service (DoS) condition or other unintended behavior.
 Detection
 The application is vulnerable by using this component.
 Recommendation
 We recommend upgrading to a version of this component that is not vulnerable 
to this specific issue.
 Note: If this component is included as a bundled/transitive dependency of 
another component, there may not be an upgrade path. In this instance, we 
recommend contacting the maintainers who included the vulnerable package. 
Alternatively, we recommend investigating alternative components or a potential 
mitigating control.
 Root Cause
 netty-codec-4.1.52.Final.jar <= 
io/netty/handler/codec/compression/Lz4FrameEncoder.class:[4.1.0.Beta2 , 
4.1.66.Final)
 Advisories
 Project:
 [https://github.com/netty/netty/pull/11429]



--
This message was sent by Atlassian Jira
(v8.20.10#820010)

Reply via email to