-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 Format: 1.8 Date: Sun, 01 Jan 2023 19:17:21 +0100 Source: netty Architecture: source Version: 1:4.1.48-6 Distribution: unstable Urgency: high Maintainer: Debian Java Maintainers <pkg-java-maintainers@lists.alioth.debian.org> Changed-By: Markus Koschany <apo@debian.org> Closes: 1001437 1014769 1027180 Changes: netty (1:4.1.48-6) unstable; urgency=high . * Team upload. * Fix CVE-2021-37136, CVE-2021-37137, CVE-2021-43797, CVE-2022-41881, and CVE-2022-41915. Several out-of-memory, stack overflow or HTTP request smuggling vulnerabilities have been discovered in Netty which may allow attackers to cause a denial of service or bypass restrictions when used as a proxy. (Closes: #1027180, #1014769, #1001437) Checksums-Sha1: 7366cf96228fbac8f97677ef8b2ff55a10c747f4 2590 netty_4.1.48-6.dsc 2d1976bcf2c25536d7b81e5a72b12d29b8b31ef2 33360 netty_4.1.48-6.debian.tar.xz d5b102c79758a12874ffb787f7725e4f19548d8d 15942 netty_4.1.48-6_amd64.buildinfo Checksums-Sha256: 3938733395b97e671f9cb5d7dbb6b85e2b7ce0782cbfe5e79daed4199e269159 2590 netty_4.1.48-6.dsc faccf5c61ff9ea5ae8d287cdbf8c14f8bd1e35e038d40d149a1ac0e1563f7cdc 33360 netty_4.1.48-6.debian.tar.xz e7df6955e48e79d9ac99019054a0a41c88b23fd5cadc24a2e9fa6950ae58b3bd 15942 netty_4.1.48-6_amd64.buildinfo Files: 9a6e6be8152eef96d932afa2211bc175 2590 java optional netty_4.1.48-6.dsc 9255fd5592f0a6da97f149fe0bacc91f 33360 java optional netty_4.1.48-6.debian.tar.xz 2ba41f73284648cc7305e38c6f9eff1d 15942 java optional netty_4.1.48-6_amd64.buildinfo -----BEGIN PGP SIGNATURE----- iQKjBAEBCgCNFiEErPPQiO8y7e9qGoNf2a0UuVE7UeQFAmOyBIpfFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldEFD RjNEMDg4RUYzMkVERUY2QTFBODM1RkQ5QUQxNEI5NTEzQjUxRTQPHGFwb0BkZWJp YW4ub3JnAAoJENmtFLlRO1HkKmYQAIZOZHjjoZEZ2MYgltnOjFih/+L+rpLteSuv 3cme2ngGgRwX7uKcceIIb4DATQNV20RsVtS8SQnbSdcy7fvmM921ryUiXSY2s9Bs gFmzsBg22UJtD3wdubMaOjHuQUTPR73dWXiQBYRXWA9sAqtkMIfqTp+Vz3sRtuK2 4rbfyvaNYkcHh9N1Zzf+IRhRqH/W7Fj7XOPgyU7beJjg8o+xSaZJxaBWd6hO7FH0 L4bQbiEMtu6IKz/1FPXBzqYRaXDF+DtpHddDS+ZPVE2awsccfCZfCAqC240CQnvd Sne4X5m6uw/m0/1IX2ndoFTd6CN+QW4mpGf4xMM5URUlKg98WX4Kdr6TqlBPlypd BCy5VxzpG4R5OGkBchVO7TzT13IYEmWAsKCJrnpHV+STLkmUrbh0v3EjrhC6EAuI yxNMF6GOKVzKs6dMFvY84NDCJO8QgoEQG9gh2pSkY4QuALo2HOVraN5ko9KpjBPj CXml2OhCDEHYLZ+2wobrjBbzFUPb7+hyj9eHnwvpL0+2jZy2dQLyeb1RjHPqrMM+ UMdsXlKGWioFJPlZt06wwP7yfLM6mc+E4/3O1lvNe6KSgxiQD5+ACtVRuW48nqL1 civ6okkhWrVxJx2CTRa82vj4/YIwgummOZb7dXrA1HDKm0O2Lw6U8NY1sAAPtL6+ A778h0nW =aVd7 -----END PGP SIGNATURE-----