| Summary: | dev-java/netty: Local Information Disclosure Vulnerability | ||
|---|---|---|---|
| Product: | Gentoo Security | Reporter: | Federico Justus Denkena <federico.denkena> |
| Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
| Status: | RESOLVED INVALID | ||
| Severity: | trivial | CC: | java |
| Priority: | Normal | ||
| Version: | unspecified | ||
| Hardware: | All | ||
| OS: | Linux | ||
| URL: | https://github.com/netty/netty/security/advisories/GHSA-269q-hmxg-m83q | ||
| Whiteboard: | ~4 [ebuild] | ||
| Package list: | Runtime testing required: | --- | |
|
Description
Federico Justus Denkena
2022-06-13 14:06:47 UTC
Fixed in 4.1.77.Final netty-codec-http-4.1.58 seems to be the highest affected version: https://mvnrepository.com/artifact/io.netty/netty-codec-http/4.1.58.Final But dev-java/netty-4.1.35 does not have the netty-codec-http module. NETTY_MODULES=( "common" "resolver" "buffer" "transport" ) Adjusting summary and whiteboard as we don't have a fixed version in tree yet. (In reply to Volkmar W. Pogatzki from comment #2) > netty-codec-http-4.1.58 seems to be the highest affected version: > https://mvnrepository.com/artifact/io.netty/netty-codec-http/4.1.58.Final > > But dev-java/netty-4.1.35 does not have the netty-codec-http module. > > NETTY_MODULES=( > "common" > "resolver" > "buffer" > "transport" > ) Just to be clear, are you saying we're unaffected here? (In reply to John Helmert III from comment #3) > [...] > Just to be clear, are you saying we're unaffected here? Exactly. Thanks! Invalid then. 9ts64j2: Note that you didn't do anything wrong here, netty is weird and hard to track what vulnerabilities affect us. |