Bug 1206360 - (CVE-2022-41881) VUL-0: CVE-2022-41881: netty: Infinte recursion in HAProxyMessageDecoder
(CVE-2022-41881)
VUL-0: CVE-2022-41881: netty: Infinte recursion in HAProxyMessageDecoder
Status: NEW
Classification: Novell Products
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents
unspecified
Other Other
: P3 - Medium : Major
: ---
Assigned To: Fridrich Strba
Security Team bot
https://smash.suse.de/issue/350370/
CVSSv3.1:SUSE:CVE-2022-41881:7.5:(AV:...
:
Depends on:
Blocks:
  Show dependency treegraph
 
Reported: 2022-12-13 09:35 UTC by Hu
Modified: 2023-03-30 19:04 UTC (History)
3 users (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---
stoyan.manolov: needinfo? (fstrba)


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Hu 2022-12-13 09:35:01 UTC
CVE-2022-41881

Netty project is an event-driven asynchronous network application framework. In
versions prior to 4.1.86.Final, a StackOverflowError can be raised when parsing
a malformed crafted message due to an infinite recursion. This issue is patched
in version 4.1.86.Final. There is no workaround, except using a custom
HaProxyMessageDecoder.

References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-41881
https://www.cve.org/CVERecord?id=CVE-2022-41881
https://github.com/netty/netty/security/advisories/GHSA-fx2c-96vj-985v
Comment 1 Hu 2022-12-13 09:35:38 UTC
Affected:
- SUSE:SLE-15-SP2:Update/netty                            4.1.75
- SUSE:SLE-15-SP2:Update:Products:Manager41:Update/netty  4.1.44
- SUSE:SLE-15-SP3:Update:Products:Manager42:Update/netty  4.1.44
- SUSE:SLE-15-SP4:Update:Products:Manager43:Update/netty  4.1.44
- openSUSE:Backports:SLE-15-SP3/netty                     4.1.13

Not Affected:
- SUSE:SLE-15-SP2:Update/netty3                           3.10.6
- openSUSE:Factory/netty3                                 3.10.6