Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:rpm/redhat/eap7-netty@4.1.94-1.Final_redhat_00001.1?arch=el7eap
purl pkg:rpm/redhat/eap7-netty@4.1.94-1.Final_redhat_00001.1?arch=el7eap
Next non-vulnerable version None.
Latest non-vulnerable version None.
Risk 4.0
Vulnerabilities affecting this package (5)
Vulnerability Summary Fixed by
VCID-8b9g-6r2j-tqhw
Aliases:
CVE-2023-34462
GHSA-6mjq-h674-j845
Allocation of Resources Without Limits or Throttling Netty is an asynchronous event-driven network application framework for rapid development of maintainable high performance protocol servers & clients. The `SniHandler` can allocate up to 16MB of heap for each channel during the TLS handshake. When the handler or the channel does not have an idle timeout, it can be used to make a TCP server using the `SniHandler` to allocate 16MB of heap. The `SniHandler` class is a handler that waits for the TLS handshake to configure a `SslHandler` according to the indicated server name by the `ClientHello` record. For this matter it allocates a `ByteBuf` using the value defined in the `ClientHello` record. Normally the value of the packet should be smaller than the handshake packet but there are not checks done here and the way the code is written, it is possible to craft a packet that makes the `SslClientHelloHandler`. This vulnerability has been fixed in version 4.1.94.Final. There are no reported fixed by versions.
VCID-khr7-6pza-afab
Aliases:
CVE-2023-26464
GHSA-vp98-w2p3-mv35
Apache Log4j 1.x (EOL) allows Denial of Service (DoS) ** UNSUPPORTED WHEN ASSIGNED ** When using the Chainsaw or SocketAppender components with Log4j 1.x on JRE less than 1.7, an attacker that manages to cause a logging entry involving a specially-crafted (ie deeply nested) hashmap or hashtable (depending on which logging component is in use) to be processed could exhaust the available memory in the virtual machine and achieve Denial of Service when the object is deserialized. This issue affects Apache Log4j before 2. Affected users are recommended to update to Log4j 2.x. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. There are no reported fixed by versions.
VCID-nahx-etfu-qqfq
Aliases:
CVE-2022-25883
GHSA-c2qf-rxjj-qqgw
semver vulnerable to Regular Expression Denial of Service Versions of the package semver before 7.5.2 on the 7.x branch, before 6.3.1 on the 6.x branch, and all other versions before 5.7.2 are vulnerable to Regular Expression Denial of Service (ReDoS) via the function new Range, when untrusted user data is provided as a range. There are no reported fixed by versions.
VCID-wjaq-7np6-z3bk
Aliases:
CVE-2023-26136
GHSA-72xf-g2v4-qvf3
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') Versions of the package tough-cookie before 4.1.3 is vulnerable to Prototype Pollution due to improper handling of Cookies when using CookieJar in rejectPublicSuffixes=false mode. This issue arises from the manner in which the objects are initialized. There are no reported fixed by versions.
VCID-zxsk-ucu6-73h1
Aliases:
CVE-2023-3171
eap-7: heap exhaustion via deserialization There are no reported fixed by versions.
Vulnerabilities fixed by this package (0)
Vulnerability Summary Aliases
This package is not known to fix vulnerabilities.

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-01T13:55:02.852014+00:00 RedHat Importer Affected by VCID-khr7-6pza-afab https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-26464.json 38.0.0
2026-04-01T13:53:40.209889+00:00 RedHat Importer Affected by VCID-nahx-etfu-qqfq https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-25883.json 38.0.0
2026-04-01T13:53:38.686110+00:00 RedHat Importer Affected by VCID-8b9g-6r2j-tqhw https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-34462.json 38.0.0
2026-04-01T13:53:36.272991+00:00 RedHat Importer Affected by VCID-wjaq-7np6-z3bk https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-26136.json 38.0.0
2026-04-01T13:52:27.155756+00:00 RedHat Importer Affected by VCID-zxsk-ucu6-73h1 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-3171.json 38.0.0