Skip to content

Commit

Permalink
Adding CVE as alias
Browse files Browse the repository at this point in the history
  • Loading branch information
Chetven committed Dec 21, 2024
1 parent aef7ebc commit c33b3d3
Showing 1 changed file with 4 additions and 2 deletions.
Original file line number Diff line number Diff line change
Expand Up @@ -3,7 +3,9 @@
"id": "GHSA-q4h9-7rxj-7gx2",
"modified": "2024-12-02T20:03:14Z",
"published": "2024-12-02T20:03:03Z",
"aliases": [],
"aliases": [
"CVE-2024-47535"
],
"summary": "Netty vulnerability included in redis lettuce",
"details": "### Summary\nNote: i'm reporting this in this way purely because it's private and i don't want to broadcast vulnerabilities.\n\n> An unsafe reading of environment file could potentially cause a denial of service in Netty. When loaded on an Windows application, Netty attempts to load a file that does not exist. If an attacker creates such a large file, the Netty application crashes. This vulnerability is fixed in 4.1.115.\n\n### Details\nhttps://github.com/redis/lettuce/blob/main/pom.xml#L67C9-L67C53 The netty version pinned here is currently \n```\n<netty.version>4.1.113.Final</netty.version>\n```\nThis version is vulnerable according to Snyk and is affecting one of our products:\n![image](https://github.com/user-attachments/assets/a7c78c24-f1e3-4f29-bc49-b252d330002a)\n\nHere is a [link](https://www.cve.org/CVERecord?id=CVE-2024-47535) to the CVE\n\n### PoC\n_Complete instructions, including specific configuration details, to reproduce the vulnerability._\nNot applicable\n\n### Impact\n_What kind of vulnerability is it? Who is impacted?_\nDenial of Service, affecting Windows users. ",
"severity": [
Expand Down Expand Up @@ -64,4 +66,4 @@
"github_reviewed_at": "2024-12-02T20:03:03Z",
"nvd_published_at": null
}
}
}

0 comments on commit c33b3d3

Please sign in to comment.