Netty 4.1.1.Final released
I'm happy to announce the first bug-fix release for our 4.1.x series today.
This release contains many bug-fixes and also one security bug-fix which was filled as CVE-2016-4970 and can lead to
a DOS. Because of this security bugfix you should upgrade ASAP if you use our
which is true if you have
netty-tcnative on your classpath and openssl libraries installed on the system.
The most important changes are:
- OpenSslEngine writePlaintextData WANT_READ with no data in BIO buffer (#5364)
- Ensure the correct wrapped buffer is released in AbstractPooledDerivedByteBuf.deallocate() (#5347)
For the details and all changes, please browse our issue tracker.
As always, please let us know if you find any issues. We love feedback!
Every idea and bug-report counts and so we thought it is worth mentioning those who helped in this area. Please report an unintended omission.