File _patchinfo of Package patchinfo.42016

<patchinfo incident="42016">
  <issue tracker="bnc" id="1255048">VUL-0: CVE-2025-67735: netty: CRLF injection constructing a request can lead to request smuggling</issue>
  <issue tracker="cve" id="2025-67735"/>
  <packager>fstrba</packager>
  <rating>moderate</rating>
  <category>security</category>
  <summary>Security update for netty</summary>
  <description>This update for netty fixes the following issues:

Update to upstream version 4.1.130.

Security issues fixed:

- CVE-2025-67735: lack of URI sanitization in `HttpRequestEncoder` allows for CRLF injection through a request URI and
  can lead to request smuggling (bsc#1255048).

Other updates and bugfixes:

- Version 4.1.130:
  * Update `lz4-java` version to 1.10.1
  * Close `Channel` and fail bootstrap when setting a `ChannelOption` causes an error
  * Discard the following `HttpContent` for preflight request
  * Fix race condition in `NonStickyEventExecutorGroup` causing incorrect `inEventLoop()` results
  * Fix Zstd compression for large data
  * Fix `ZstdEncoder` not producing data when source is smaller than block
  * Make big endian ASCII hashcode consistent with little endian
  * Fix reentrancy bug in `ByteToMessageDecoder`
  * Add 32k and 64k size classes to adaptive allocator
  * Re-enable reflective field accesses in native images
  * Correct HTTP/2 padding length check
  * Fix HTTP startline validation
  * Fix `MpscIntQueue` bug

- Build against the `org.jboss:jdk-misc` artifact that is implementing the `sun.misc` classes removed in Java 25
</description>
</patchinfo>
openSUSE Build Service is sponsored by