On Thu, Jan 02, 2020 at 11:38:08PM +0100, Salvatore Bonaccorso wrote:
> On Fri, Sep 27, 2019 at 01:12:04PM +0200, Salvatore Bonaccorso wrote:
> > Source: netty
> > Version: 1:4.1.33-1
> > Severity: important
> > Tags: security upstream
> > Forwarded: https://github.com/netty/netty/issues/9571
> > 
> > Hi,
> > 
> > The following vulnerability was published for netty.
> > 
> > CVE-2019-16869[0]:
> > | Netty before 4.1.42.Final mishandles whitespace before the colon in
> > | HTTP headers (such as a "Transfer-Encoding : chunked" line), which
> > | leads to HTTP request smuggling.
> 
> Attached is the proposed debdiff. I included the tests as well
> (altough those are not run).

Hi Salvatore,

The debdiff looks good to me; thank you for adapting the patch for the
current version in 4.1.33.  No need for an NMU.  I will apply your patch
and perform a team upload to unstable with only this change to make it
easier for backports/security uploads.

Thanks,
tony

Attachment: signature.asc
Description: PGP signature

Reply via email to