Security vulnerabilities for Netty Project netty-4.1.61.Final

Hi,

There is two security vulnerabilities present in netty-4.1.61.Final version present in readonlyrest-1.34.0_es7.10.0.zip.

Netty is vulnerable to excessive memory usage due to being unable to set size restrictions on decompressed data input. An attacker could exploit this by supplying crafted input in order to cause a denial-of-service (DoS).

Netty is susceptible to excessive memory usage due to missing chunk length restrictions and the potential buffering of reserved skippable chunks until the complete chunk has been received. An attacker could exploit this by supplying crafted input in order to cause a denial-of-service (DoS).

Please look into this.

Thanks for the report.
We will check it immediately.

This is fixed in ROR 1.35.1!