It was discovered that Netty did not properly sanitize its input
parameters. A remote attacker could possibly use this issue to cause a
crash. (CVE-2023-34462)
It was discovered that Netty incorrectly handled request cancellation. A
remote attacker could possibly use this issue to cause Netty to consume
resources, leading to a denial of service. (CVE-2023-44487)
More Stories
valkey-8.0.1-1.fc40
FEDORA-2024-8a9a692906 Packages in this update: valkey-8.0.1-1.fc40 Update description: update to 8.0.1 fixes (CVE-2024-31449) Lua library commands may lead to stack...
valkey-8.0.1-1.fc41
FEDORA-2024-e717420659 Packages in this update: valkey-8.0.1-1.fc41 Update description: update to 8.0.1 fixes (CVE-2024-31449) Lua library commands may lead to stack...
valkey-8.0.1-1.el9
FEDORA-EPEL-2024-845b92ee3f Packages in this update: valkey-8.0.1-1.el9 Update description: update to 8.0.1 fixes (CVE-2024-31449) Lua library commands may lead to stack...
valkey-8.0.1-1.fc39
FEDORA-2024-83e96146cf Packages in this update: valkey-8.0.1-1.fc39 Update description: update to 8.0.1 fixes (CVE-2024-31449) Lua library commands may lead to stack...
pdns-recursor-5.1.2-1.fc41
FEDORA-2024-aebaa73b1f Packages in this update: pdns-recursor-5.1.2-1.fc41 Update description: Update to latest upstream Read More
pdns-recursor-5.0.9-1.fc40
FEDORA-2024-af0bf62ac6 Packages in this update: pdns-recursor-5.0.9-1.fc40 Update description: Update to latest upstream Read More