ALT-BU-2016-2578-2
Branch sisyphus update bulletin.
Closed bugs
просьба собрать свежую версию 0.98
Closed vulnerabilities
Modified: 2021-03-23
BDU:2016-01546
Уязвимость набора библиотек Network Security Services и браузера Firefox, позволяющая нарушителю вызвать отказ в обслуживании или оказать другое воздействие
Modified: 2025-04-12
CVE-2016-2834
Mozilla Network Security Services (NSS) before 3.23, as used in Mozilla Firefox before 47.0, allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact via unknown vectors.
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00014.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00016.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00055.html
- http://rhn.redhat.com/errata/RHSA-2016-2779.html
- http://www.debian.org/security/2016/dsa-3688
- http://www.mozilla.org/security/announce/2016/mfsa2016-61.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
- http://www.securityfocus.com/bid/91072
- http://www.securitytracker.com/id/1036057
- http://www.ubuntu.com/usn/USN-2993-1
- http://www.ubuntu.com/usn/USN-3029-1
- https://bugzilla.mozilla.org/show_bug.cgi?id=1206283
- https://bugzilla.mozilla.org/show_bug.cgi?id=1221620
- https://bugzilla.mozilla.org/show_bug.cgi?id=1241034
- https://bugzilla.mozilla.org/show_bug.cgi?id=1241037
- https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.23_release_notes
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00014.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00016.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00055.html
- http://rhn.redhat.com/errata/RHSA-2016-2779.html
- http://www.debian.org/security/2016/dsa-3688
- http://www.mozilla.org/security/announce/2016/mfsa2016-61.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
- http://www.securityfocus.com/bid/91072
- http://www.securitytracker.com/id/1036057
- http://www.ubuntu.com/usn/USN-2993-1
- http://www.ubuntu.com/usn/USN-3029-1
- https://bugzilla.mozilla.org/show_bug.cgi?id=1206283
- https://bugzilla.mozilla.org/show_bug.cgi?id=1221620
- https://bugzilla.mozilla.org/show_bug.cgi?id=1241034
- https://bugzilla.mozilla.org/show_bug.cgi?id=1241037
- https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.23_release_notes
Closed bugs
OpenSSL version mismatch
Closed bugs
отсутствует pdf2swf
Closed vulnerabilities
Modified: 2024-07-05
BDU:2015-02661
Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
Modified: 2021-03-23
BDU:2015-12012
Уязвимость почтового клиента RoundCube Webmail операционной системы openSUSE, позволяющая нарушителю осуществить межсайтовое выполнение сценариев
Modified: 2026-04-29
CVE-2012-3507
Cross-site scripting (XSS) vulnerability in program/steps/mail/func.inc in RoundCube Webmail before 0.8.0, when using the Larry skin, allows remote attackers to inject arbitrary web script or HTML via the email message subject.
- http://secunia.com/advisories/50212
- http://sourceforge.net/projects/roundcubemail/files/roundcubemail/0.8.0/
- http://trac.roundcube.net/ticket/1488519
- http://www.openwall.com/lists/oss-security/2012/08/20/2
- http://www.openwall.com/lists/oss-security/2012/08/20/3
- http://www.openwall.com/lists/oss-security/2012/08/20/9
- http://www.securelist.com/en/advisories/50212
- http://secunia.com/advisories/50212
- http://sourceforge.net/projects/roundcubemail/files/roundcubemail/0.8.0/
- http://trac.roundcube.net/ticket/1488519
- http://www.openwall.com/lists/oss-security/2012/08/20/2
- http://www.openwall.com/lists/oss-security/2012/08/20/3
- http://www.openwall.com/lists/oss-security/2012/08/20/9
- http://www.securelist.com/en/advisories/50212
Modified: 2026-04-29
CVE-2012-4668
Cross-site scripting (XSS) vulnerability in Roundcube Webmail 0.8.1 and earlier allows remote attackers to inject arbitrary web script or HTML via the signature in an email.
- http://sourceforge.net/news/?group_id=139281&id=309011
- http://trac.roundcube.net/ticket/1488613
- http://www.openwall.com/lists/oss-security/2012/08/20/2
- http://www.openwall.com/lists/oss-security/2012/08/20/9
- https://github.com/roundcube/roundcubemail/commit/c086978f6a91eacb339fd2976202fca9dad2ef32
- http://sourceforge.net/news/?group_id=139281&id=309011
- http://trac.roundcube.net/ticket/1488613
- http://www.openwall.com/lists/oss-security/2012/08/20/2
- http://www.openwall.com/lists/oss-security/2012/08/20/9
- https://github.com/roundcube/roundcubemail/commit/c086978f6a91eacb339fd2976202fca9dad2ef32
Modified: 2026-04-29
CVE-2012-6121
Cross-site scripting (XSS) vulnerability in Roundcube Webmail before 0.8.5 allows remote attackers to inject arbitrary web script or HTML via a (1) data:text or (2) vbscript link.
- http://lists.opensuse.org/opensuse-updates/2013-02/msg00051.html
- http://lists.opensuse.org/opensuse-updates/2013-09/msg00018.html
- http://sourceforge.net/news/?group_id=139281&id=310213
- http://trac.roundcube.net/ticket/1488850
- http://www.openwall.com/lists/oss-security/2013/02/08/1
- http://www.securityfocus.com/bid/57849
- https://github.com/roundcube/roundcubemail/commit/74cd0a9b62f11bc07c5a1d3ba0098b54883eb0ba
- http://lists.opensuse.org/opensuse-updates/2013-02/msg00051.html
- http://lists.opensuse.org/opensuse-updates/2013-09/msg00018.html
- http://sourceforge.net/news/?group_id=139281&id=310213
- http://trac.roundcube.net/ticket/1488850
- http://www.openwall.com/lists/oss-security/2013/02/08/1
- http://www.securityfocus.com/bid/57849
- https://github.com/roundcube/roundcubemail/commit/74cd0a9b62f11bc07c5a1d3ba0098b54883eb0ba
Modified: 2026-04-29
CVE-2013-1904
Absolute path traversal vulnerability in steps/mail/sendmail.inc in Roundcube Webmail before 0.7.3 and 0.8.x before 0.8.6 allows remote attackers to read arbitrary files via a full pathname in the _value parameter for the generic_message_footer setting in a save-perf action to index.php, as exploited in the wild in March 2013.
- http://habrahabr.ru/post/174423/
- http://lists.opensuse.org/opensuse-updates/2013-04/msg00080.html
- http://lists.roundcube.net/pipermail/dev/2013-March/022328.html
- http://sourceforge.net/p/roundcubemail/news/2013/03/security-updates-086-and-073/
- http://www.openwall.com/lists/oss-security/2013/03/28/8
- http://habrahabr.ru/post/174423/
- http://lists.opensuse.org/opensuse-updates/2013-04/msg00080.html
- http://lists.roundcube.net/pipermail/dev/2013-March/022328.html
- http://sourceforge.net/p/roundcubemail/news/2013/03/security-updates-086-and-073/
- http://www.openwall.com/lists/oss-security/2013/03/28/8
Modified: 2026-04-29
CVE-2013-5645
Multiple cross-site scripting (XSS) vulnerabilities in Roundcube webmail before 0.9.3 allow user-assisted remote attackers to inject arbitrary web script or HTML via the body of a message visited in (1) new or (2) draft mode, related to compose.inc; and (3) might allow remote authenticated users to inject arbitrary web script or HTML via an HTML signature, related to save_identity.inc.
- http://lists.opensuse.org/opensuse-updates/2013-09/msg00018.html
- http://trac.roundcube.net/changeset/93b0a30c1c8aa29d862b587b31e52bcc344b8d16/github
- http://trac.roundcube.net/changeset/ce5a6496fd6039962ba7424d153278e41ae8761b/github
- http://trac.roundcube.net/ticket/1489251
- http://trac.roundcube.net/wiki/Changelog#RELEASE0.9.3
- http://lists.opensuse.org/opensuse-updates/2013-09/msg00018.html
- http://trac.roundcube.net/changeset/93b0a30c1c8aa29d862b587b31e52bcc344b8d16/github
- http://trac.roundcube.net/changeset/ce5a6496fd6039962ba7424d153278e41ae8761b/github
- http://trac.roundcube.net/ticket/1489251
- http://trac.roundcube.net/wiki/Changelog#RELEASE0.9.3
Modified: 2026-04-29
CVE-2013-6172
steps/utils/save_pref.inc in Roundcube webmail before 0.8.7 and 0.9.x before 0.9.5 allows remote attackers to modify configuration settings via the _session parameter, which can be leveraged to read arbitrary files, conduct SQL injection attacks, and execute arbitrary code.
- http://lists.opensuse.org/opensuse-updates/2014-03/msg00035.html
- http://roundcube.net/news/2013/10/21/security-updates-095-and-087/
- http://trac.roundcube.net/ticket/1489382
- http://www.debian.org/security/2013/dsa-2787
- http://www.interworx.com/developers/changelog/version-5-0-13-build-574-2014-02-19
- http://lists.opensuse.org/opensuse-updates/2014-03/msg00035.html
- http://roundcube.net/news/2013/10/21/security-updates-095-and-087/
- http://trac.roundcube.net/ticket/1489382
- http://www.debian.org/security/2013/dsa-2787
- http://www.interworx.com/developers/changelog/version-5-0-13-build-574-2014-02-19
Modified: 2025-04-12
CVE-2014-9587
Multiple cross-site request forgery (CSRF) vulnerabilities in Roundcube Webmail before 1.0.4 allow remote attackers to hijack the authentication of unspecified victims via unknown vectors, related to (1) address book operations or the (2) ACL or (3) Managesieve plugins.
- http://roundcube.net/news/2014/12/18/update-1.0.4-released/
- http://www.openwall.com/lists/oss-security/2015/01/11/3
- http://www.securityfocus.com/bid/71909
- https://bugs.gentoo.org/show_bug.cgi?id=534766
- https://bugzilla.redhat.com/show_bug.cgi?id=1179780
- http://roundcube.net/news/2014/12/18/update-1.0.4-released/
- http://www.openwall.com/lists/oss-security/2015/01/11/3
- http://www.securityfocus.com/bid/71909
- https://bugs.gentoo.org/show_bug.cgi?id=534766
- https://bugzilla.redhat.com/show_bug.cgi?id=1179780
Modified: 2025-04-20
CVE-2015-2180
The DBMail driver in the Password plugin in Roundcube before 1.1.0 allows remote attackers to execute arbitrary commands via shell metacharacters in the password.
Modified: 2025-04-20
CVE-2015-2181
Multiple buffer overflows in the DBMail driver in the Password plugin in Roundcube before 1.1.0 allow remote attackers to have unspecified impact via the (1) password or (2) username.
Modified: 2025-04-12
CVE-2015-8105
Cross-site scripting (XSS) vulnerability in program/js/app.js in Roundcube webmail before 1.0.7 and 1.1.x before 1.1.3 allows remote authenticated users to inject arbitrary web script or HTML via the file name in a drag-n-drop file upload.
- http://lists.opensuse.org/opensuse-updates/2015-11/msg00030.html
- http://trac.roundcube.net/changeset/dd7db2179/github
- http://trac.roundcube.net/ticket/1490530
- https://security.gentoo.org/glsa/201603-03
- http://lists.opensuse.org/opensuse-updates/2015-11/msg00030.html
- http://trac.roundcube.net/changeset/dd7db2179/github
- http://trac.roundcube.net/ticket/1490530
- https://security.gentoo.org/glsa/201603-03
Modified: 2025-04-12
CVE-2015-8793
Cross-site scripting (XSS) vulnerability in program/include/rcmail.php in Roundcube before 1.0.6 and 1.1.x before 1.1.2 allows remote attackers to inject arbitrary web script or HTML via the _mbox parameter in a mail task to the default URL, a different vulnerability than CVE-2011-2937.
- http://trac.roundcube.net/ticket/1490417
- http://trac.roundcube.net/wiki/Changelog#RELEASE1.1.2
- https://roundcube.net/news/2015/06/05/updates-1.1.2-and-1.0.6-released/
- http://trac.roundcube.net/ticket/1490417
- http://trac.roundcube.net/wiki/Changelog#RELEASE1.1.2
- https://roundcube.net/news/2015/06/05/updates-1.1.2-and-1.0.6-released/
Closed vulnerabilities
Modified: 2024-11-21
CVE-2017-12174
It was found that when Artemis and HornetQ before 2.4.0 are configured with UDP discovery and JGroups discovery a huge byte array is created when receiving an unexpected multicast message. This may result in a heap memory exhaustion, full GC, or OutOfMemoryError.
- https://access.redhat.com/errata/RHSA-2018:0268
- https://access.redhat.com/errata/RHSA-2018:0269
- https://access.redhat.com/errata/RHSA-2018:0270
- https://access.redhat.com/errata/RHSA-2018:0271
- https://access.redhat.com/errata/RHSA-2018:0275
- https://access.redhat.com/errata/RHSA-2018:0478
- https://access.redhat.com/errata/RHSA-2018:0479
- https://access.redhat.com/errata/RHSA-2018:0480
- https://access.redhat.com/errata/RHSA-2018:0481
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-12174
- https://lists.apache.org/thread.html/rb2fd3bf2dce042e0ab3f3c94c4767c96bb2e7e6737624d63162df36d%40%3Ccommits.activemq.apache.org%3E
- https://lists.apache.org/thread.html/rc96ad63f148f784c84ea7f0a178c84a8985c6afccabbcd9847a82088%40%3Ccommits.activemq.apache.org%3E
- https://access.redhat.com/errata/RHSA-2018:0268
- https://access.redhat.com/errata/RHSA-2018:0269
- https://access.redhat.com/errata/RHSA-2018:0270
- https://access.redhat.com/errata/RHSA-2018:0271
- https://access.redhat.com/errata/RHSA-2018:0275
- https://access.redhat.com/errata/RHSA-2018:0478
- https://access.redhat.com/errata/RHSA-2018:0479
- https://access.redhat.com/errata/RHSA-2018:0480
- https://access.redhat.com/errata/RHSA-2018:0481
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-12174
- https://lists.apache.org/thread.html/rb2fd3bf2dce042e0ab3f3c94c4767c96bb2e7e6737624d63162df36d%40%3Ccommits.activemq.apache.org%3E
- https://lists.apache.org/thread.html/rc96ad63f148f784c84ea7f0a178c84a8985c6afccabbcd9847a82088%40%3Ccommits.activemq.apache.org%3E
Modified: 2022-07-02
GHSA-gc96-h5pr-839j
Uncontrolled Resource Consumption in Artemis and HornetQ
- https://nvd.nist.gov/vuln/detail/CVE-2017-12174
- https://access.redhat.com/errata/RHSA-2018:0268
- https://access.redhat.com/errata/RHSA-2018:0269
- https://access.redhat.com/errata/RHSA-2018:0270
- https://access.redhat.com/errata/RHSA-2018:0271
- https://access.redhat.com/errata/RHSA-2018:0275
- https://access.redhat.com/errata/RHSA-2018:0478
- https://access.redhat.com/errata/RHSA-2018:0479
- https://access.redhat.com/errata/RHSA-2018:0480
- https://access.redhat.com/errata/RHSA-2018:0481
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-12174
- https://lists.apache.org/thread.html/rb2fd3bf2dce042e0ab3f3c94c4767c96bb2e7e6737624d63162df36d%40%3Ccommits.activemq.apache.org%3E
- https://lists.apache.org/thread.html/rb2fd3bf2dce042e0ab3f3c94c4767c96bb2e7e6737624d63162df36d@%3Ccommits.activemq.apache.org%3E
- https://lists.apache.org/thread.html/rc96ad63f148f784c84ea7f0a178c84a8985c6afccabbcd9847a82088%40%3Ccommits.activemq.apache.org%3E
- https://lists.apache.org/thread.html/rc96ad63f148f784c84ea7f0a178c84a8985c6afccabbcd9847a82088@%3Ccommits.activemq.apache.org%3E
Closed vulnerabilities
Modified: 2025-04-12
CVE-2014-0193
WebSocket08FrameDecoder in Netty 3.6.x before 3.6.9, 3.7.x before 3.7.1, 3.8.x before 3.8.2, 3.9.x before 3.9.1, and 4.0.x before 4.0.19 allows remote attackers to cause a denial of service (memory consumption) via a TextWebSocketFrame followed by a long stream of ContinuationWebSocketFrames.
- http://netty.io/news/2014/04/30/release-day.html
- http://rhn.redhat.com/errata/RHSA-2014-1019.html
- http://rhn.redhat.com/errata/RHSA-2014-1020.html
- http://rhn.redhat.com/errata/RHSA-2014-1021.html
- http://rhn.redhat.com/errata/RHSA-2014-1351.html
- http://rhn.redhat.com/errata/RHSA-2015-0675.html
- http://rhn.redhat.com/errata/RHSA-2015-0720.html
- http://rhn.redhat.com/errata/RHSA-2015-0765.html
- http://secunia.com/advisories/58280
- http://secunia.com/advisories/59290
- http://www.securityfocus.com/bid/67182
- https://github.com/netty/netty/issues/2441
- https://lists.apache.org/thread.html/ff8dcfe29377088ab655fda9d585dccd5b1f07fabd94ae84fd60a7f8%40%3Ccommits.pulsar.apache.org%3E
- https://lists.debian.org/debian-lts-announce/2020/02/msg00018.html
- http://netty.io/news/2014/04/30/release-day.html
- http://rhn.redhat.com/errata/RHSA-2014-1019.html
- http://rhn.redhat.com/errata/RHSA-2014-1020.html
- http://rhn.redhat.com/errata/RHSA-2014-1021.html
- http://rhn.redhat.com/errata/RHSA-2014-1351.html
- http://rhn.redhat.com/errata/RHSA-2015-0675.html
- http://rhn.redhat.com/errata/RHSA-2015-0720.html
- http://rhn.redhat.com/errata/RHSA-2015-0765.html
- http://secunia.com/advisories/58280
- http://secunia.com/advisories/59290
- http://www.securityfocus.com/bid/67182
- https://github.com/netty/netty/issues/2441
- https://lists.apache.org/thread.html/ff8dcfe29377088ab655fda9d585dccd5b1f07fabd94ae84fd60a7f8%40%3Ccommits.pulsar.apache.org%3E
- https://lists.debian.org/debian-lts-announce/2020/02/msg00018.html
Modified: 2025-04-12
CVE-2014-3488
The SslHandler in Netty before 3.9.2 allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a crafted SSLv2Hello message.
- http://netty.io/news/2014/06/11/3-9-2-Final.html
- http://secunia.com/advisories/59196
- https://github.com/netty/netty/commit/2fa9400a59d0563a66908aba55c41e7285a04994
- https://github.com/netty/netty/issues/2562
- https://lists.debian.org/debian-lts-announce/2020/02/msg00018.html
- http://netty.io/news/2014/06/11/3-9-2-Final.html
- http://secunia.com/advisories/59196
- https://github.com/netty/netty/commit/2fa9400a59d0563a66908aba55c41e7285a04994
- https://github.com/netty/netty/issues/2562
- https://lists.debian.org/debian-lts-announce/2020/02/msg00018.html
Modified: 2025-04-20
CVE-2015-2156
Netty before 3.9.8.Final, 3.10.x before 3.10.3.Final, 4.0.x before 4.0.28.Final, and 4.1.x before 4.1.0.Beta5 and Play Framework 2.x before 2.3.9 might allow remote attackers to bypass the httpOnly flag on cookies and obtain sensitive information by leveraging improper validation of cookie name and value characters.
- http://lists.fedoraproject.org/pipermail/package-announce/2015-June/159379.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-May/159166.html
- http://netty.io/news/2015/05/08/3-9-8-Final-and-3.html
- http://www.openwall.com/lists/oss-security/2015/05/17/1
- http://www.securityfocus.com/bid/74704
- https://bugzilla.redhat.com/show_bug.cgi?id=1222923
- https://github.com/netty/netty/pull/3754
- https://lists.apache.org/thread.html/9317fd092b257a0815434b116a8af8daea6e920b6673f4fd5583d5fe%40%3Ccommits.druid.apache.org%3E
- https://lists.apache.org/thread.html/a19bb1003b0d6cd22475ba83c019b4fc7facfef2a9e13f71132529d3%40%3Ccommits.cassandra.apache.org%3E
- https://lists.apache.org/thread.html/dc1275aef115bda172851a231c76c0932d973f9ffd8bc375c4aba769%40%3Ccommits.cassandra.apache.org%3E
- https://lists.apache.org/thread.html/ff8dcfe29377088ab655fda9d585dccd5b1f07fabd94ae84fd60a7f8%40%3Ccommits.pulsar.apache.org%3E
- https://www.playframework.com/security/vulnerability/CVE-2015-2156-HttpOnlyBypass
- http://lists.fedoraproject.org/pipermail/package-announce/2015-June/159379.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-May/159166.html
- http://netty.io/news/2015/05/08/3-9-8-Final-and-3.html
- http://www.openwall.com/lists/oss-security/2015/05/17/1
- http://www.securityfocus.com/bid/74704
- https://bugzilla.redhat.com/show_bug.cgi?id=1222923
- https://github.com/netty/netty/pull/3754
- https://lists.apache.org/thread.html/9317fd092b257a0815434b116a8af8daea6e920b6673f4fd5583d5fe%40%3Ccommits.druid.apache.org%3E
- https://lists.apache.org/thread.html/a19bb1003b0d6cd22475ba83c019b4fc7facfef2a9e13f71132529d3%40%3Ccommits.cassandra.apache.org%3E
- https://lists.apache.org/thread.html/dc1275aef115bda172851a231c76c0932d973f9ffd8bc375c4aba769%40%3Ccommits.cassandra.apache.org%3E
- https://lists.apache.org/thread.html/ff8dcfe29377088ab655fda9d585dccd5b1f07fabd94ae84fd60a7f8%40%3Ccommits.pulsar.apache.org%3E
- https://www.playframework.com/security/vulnerability/CVE-2015-2156-HttpOnlyBypass
Modified: 2024-04-16
GHSA-7vpq-g998-qpv7
Netty denial of service vulnerability
- https://nvd.nist.gov/vuln/detail/CVE-2014-0193
- https://github.com/netty/netty/issues/2441
- https://github.com/netty/netty/commit/8599ab5bdb761bb99d41a975d689f74c12e4892b
- https://github.com/netty/netty
- https://lists.apache.org/thread.html/ff8dcfe29377088ab655fda9d585dccd5b1f07fabd94ae84fd60a7f8%40%3Ccommits.pulsar.apache.org%3E
- https://lists.apache.org/thread.html/ff8dcfe29377088ab655fda9d585dccd5b1f07fabd94ae84fd60a7f8@%3Ccommits.pulsar.apache.org%3E
- https://lists.debian.org/debian-lts-announce/2020/02/msg00018.html
- https://web.archive.org/web/20140509033427/http://www.securityfocus.com/bid/67182
- https://web.archive.org/web/20140509044857/http://secunia.com/advisories/58280
- https://web.archive.org/web/20161119201425/http://secunia.com/advisories/59290
- http://netty.io/news/2014/04/30/release-day.html
- http://rhn.redhat.com/errata/RHSA-2014-1019.html
- http://rhn.redhat.com/errata/RHSA-2014-1020.html
- http://rhn.redhat.com/errata/RHSA-2014-1021.html
- http://rhn.redhat.com/errata/RHSA-2014-1351.html
- http://rhn.redhat.com/errata/RHSA-2015-0675.html
- http://rhn.redhat.com/errata/RHSA-2015-0720.html
- http://rhn.redhat.com/errata/RHSA-2015-0765.html
Modified: 2021-09-22
GHSA-9959-6p3m-wxpc
Denial of service in Netty
- https://nvd.nist.gov/vuln/detail/CVE-2014-3488
- https://github.com/netty/netty/issues/2562
- https://github.com/netty/netty/commit/2fa9400a59d0563a66908aba55c41e7285a04994
- https://github.com/netty/netty
- https://lists.debian.org/debian-lts-announce/2020/02/msg00018.html
- https://snyk.io/vuln/SNYK-JAVA-ORGJBOSSNETTY-31630
- http://netty.io/news/2014/06/11/3-9-2-Final.html
- http://secunia.com/advisories/59196
Modified: 2021-09-22
GHSA-xfv3-rrfm-f2rv
Information Exposure in Netty
- https://nvd.nist.gov/vuln/detail/CVE-2015-2156
- https://github.com/netty/netty/pull/3748/commits/4ac519f534493bb0ca7a77e1c779138a54faa7b9
- https://github.com/netty/netty/pull/3754
- https://github.com/netty/netty/commit/2caa38a2795fe1f1ae6ceda4d69e826ed7c55e55
- https://github.com/netty/netty/commit/31815598a2af37f0b71ea94eada70d6659c23752
- https://bugzilla.redhat.com/show_bug.cgi?id=1222923
- https://github.com/netty/netty
- https://lists.apache.org/thread.html/9317fd092b257a0815434b116a8af8daea6e920b6673f4fd5583d5fe@%3Ccommits.druid.apache.org%3E
- https://lists.apache.org/thread.html/a19bb1003b0d6cd22475ba83c019b4fc7facfef2a9e13f71132529d3@%3Ccommits.cassandra.apache.org%3E
- https://lists.apache.org/thread.html/dc1275aef115bda172851a231c76c0932d973f9ffd8bc375c4aba769@%3Ccommits.cassandra.apache.org%3E
- https://lists.apache.org/thread.html/ff8dcfe29377088ab655fda9d585dccd5b1f07fabd94ae84fd60a7f8@%3Ccommits.pulsar.apache.org%3E
- https://snyk.io/vuln/SNYK-JAVA-IONETTY-73571
- https://www.playframework.com/security/vulnerability/CVE-2015-2156-HttpOnlyBypass
- http://lists.fedoraproject.org/pipermail/package-announce/2015-June/159379.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-May/159166.html
- http://netty.io/news/2015/05/08/3-9-8-Final-and-3.html
- http://www.openwall.com/lists/oss-security/2015/05/17/1
- http://www.securityfocus.com/bid/74704
