Packages
- netty - Java NIO client/server socket framework
Details
Jonathan Leitschuh discovered that Netty did not correctly handle file
permissions when writing temporary files. An attacker could possibly use
this issue to leak sensitive information. (CVE-2022-24823)
It was discovered that Netty did not correctly handle limiting the number
of fields when decoding a HTTP request. An attacker could possibly use
issue to cause a denial of service. This issue only affected
Ubuntu 16.04 LTS, Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, Ubuntu 22.04 LTS and
Ubuntu 24.04 LTS. (CVE-2024-29025)
Jonathan Leitschuh discovered that Netty did not correctly handle file
permissions when writing temporary files. An attacker could possibly use
this issue to leak sensitive information. (CVE-2022-24823)
It was discovered that Netty did not correctly handle limiting the number
of fields when decoding a HTTP request. An attacker could possibly use
issue to cause a denial of service. This issue only affected
Ubuntu 16.04 LTS, Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, Ubuntu 22.04 LTS and
Ubuntu 24.04 LTS. (CVE-2024-29025)
Update instructions
In general, a standard system update will make all the necessary changes.
Learn more about how to get the fixes.The problem can be corrected by updating your system to the following package versions:
Ubuntu Release | Package Version | ||
---|---|---|---|
24.10 oracular | libnetty-java – 1:4.1.48-10ubuntu0.1 | ||
24.04 noble | libnetty-java – 1:4.1.48-9ubuntu0.1~esm1 | ||
22.04 jammy | libnetty-java – 1:4.1.48-4+deb11u2ubuntu0.1~esm1 | ||
20.04 focal | libnetty-java – 1:4.1.45-1ubuntu0.1~esm2 | ||
18.04 bionic | libnetty-java – 1:4.1.7-4ubuntu0.1+esm3 | ||
16.04 xenial | libnetty-java – 1:4.0.34-1ubuntu0.1~esm2 |
Reduce your security exposure
Ubuntu Pro provides ten-year security coverage to 25,000+ packages in Main and Universe repositories, and it is free for up to five machines.