You are here
Home > Preporuke > Sigurnosni nedostatak programskog paketa netty

Sigurnosni nedostatak programskog paketa netty

  • Detalji os-a: WN7
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: LFE

Fedora Update Notification
2015-05-22 00:28:33

Name : netty
Product : Fedora 22
Version : 4.0.28
Release : 1.fc22
Summary : An asynchronous event-driven network application framework and tools for Java
Description :
Netty is a NIO client server framework which enables quick and easy
development of network applications such as protocol servers and
clients. It greatly simplifies and streamlines network programming
such as TCP and UDP socket server.

‘Quick and easy’ doesn’t mean that a resulting application will suffer
from a maintainability or a performance issue. Netty has been designed
carefully with the experiences earned from the implementation of a lot
of protocols such as FTP, SMTP, HTTP, and various binary and
text-based legacy protocols. As a result, Netty has succeeded to find
a way to achieve ease of development, performance, stability, and
flexibility without a compromise.

Update Information:

Security fix for CVE-2015-2156

* Wed May 20 2015 Severin Gehwolf <> – 4.0.28-1
– Update to upstream 4.0.28 release.
– Fixes CVE-2015-2156 (HttpOnly cookie bypass).
– Resolves RHBZ#1111502
* Wed May 20 2015 Severin Gehwolf <> – 4.0.27-1
– Update to upstream 4.0.27 release.

[ 1 ] Bug #1222923 – CVE-2015-2156 netty: HttpOnly cookie bypass

This update can be installed with the “yum” update program. Use
su -c ‘yum update netty’ at the command line.
For more information, refer to “Managing Software with yum”,
available at

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
package-announce mailing list

AutorMarko Stanec
Cert idNCERT-REF-2015-06-0010-ADV
More in Preporuke
Sigurnosni nedostaci programskog paketa libtiff

Otkriven je sigurnosni nedostatak u programskom paketu libtiff za Fedoru 21. Otkriveni nedostatak potencijalnim napadačima omogućuje rušenje aplikacije i potencijalno...