<html>
    <head>
      <base href="https://bugzilla.rosalinux.ru/">
    </head>
    <body><table border="1" cellspacing="0" cellpadding="8">
        <tr>
          <th>Platform</th>
          <td>2021.1
          </td>
        </tr>

        <tr>
          <th>Bug ID</th>
          <td><a class="bz_bug_link 
          bz_status_CONFIRMED "
   title="CONFIRMED - [CVE 21] netty 4.1.13 CVEs found"
   href="https://bugzilla.rosalinux.ru/show_bug.cgi?id=13559">13559</a>
          </td>
        </tr>

        <tr>
          <th>Summary</th>
          <td>[CVE 21] netty 4.1.13  CVEs found
          </td>
        </tr>

        <tr>
          <th>Classification</th>
          <td>ROSA-based products
          </td>
        </tr>

        <tr>
          <th>Product</th>
          <td>ROSA Fresh
          </td>
        </tr>

        <tr>
          <th>Version</th>
          <td>All
          </td>
        </tr>

        <tr>
          <th>Hardware</th>
          <td>All
          </td>
        </tr>

        <tr>
          <th>URL</th>
          <td>CVE-2023-34462,
          </td>
        </tr>

        <tr>
          <th>OS</th>
          <td>Linux
          </td>
        </tr>

        <tr>
          <th>Status</th>
          <td>CONFIRMED
          </td>
        </tr>

        <tr>
          <th>Severity</th>
          <td>normal
          </td>
        </tr>

        <tr>
          <th>Priority</th>
          <td>Normal
          </td>
        </tr>

        <tr>
          <th>Component</th>
          <td>System (kernel, glibc, systemd, bash, PAM...)
          </td>
        </tr>

        <tr>
          <th>Assignee</th>
          <td>bugs&#64;lists.rosalinux.ru
          </td>
        </tr>

        <tr>
          <th>Reporter</th>
          <td>y.tumanov&#64;rosalinux.ru
          </td>
        </tr>

        <tr>
          <th>QA Contact</th>
          <td>bugs&#64;lists.rosalinux.ru
          </td>
        </tr>

        <tr>
          <th>CC</th>
          <td>e.kosachev&#64;rosalinux.ru, s.matveev&#64;rosalinux.ru, y.tumanov&#64;rosalinux.ru
          </td>
        </tr>

        <tr>
          <th>Target Milestone</th>
          <td>---
          </td>
        </tr>

        <tr>
          <th>Flags</th>
          <td>secteam_verified?
          </td>
        </tr></table>
      <p>
        <div>
        <pre>Please patch CVEs for package netty version 4.1.13

INFO (CVEs are): netty 4.1.13
 cves found
CVE-2023-34462
Desc: Netty is an asynchronous event-driven network application framework for
rapid development of maintainable high performance protocol servers &amp; clients.
The `SniHandler` can allocate up to 16MB of heap for each channel during the
TLS handshake. When the handler or the channel does not have an idle timeout,
it can be used to make a TCP server using the `SniHandler` to allocate 16MB of
heap. The `SniHandler` class is a handler that waits for the TLS handshake to
configure a `SslHandler` according to the indicated server name by the
`ClientHello` record. For this matter it allocates a `ByteBuf` using the value
defined in the `ClientHello` record. Normally the value of the packet should be
smaller than the handshake packet but there are not checks done here and the
way the code is written, it is possible to craft a packet that makes the
`SslClientHelloHandler`. This vulnerability has been fixed in version
4.1.94.Final.
Link: <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-34462">https://nvd.nist.gov/vuln/detail/CVE-2023-34462</a>
Severity: MEDIUM</pre>
        </div>
      </p>


      <hr>
      <span>You are receiving this mail because:</span>

      <ul>
          <li>You are the QA Contact for the bug.</li>
          <li>You are the assignee for the bug.</li>
      </ul>
    </body>
</html>