First published: Mon Dec 12 2022(Updated: )
A flaw was found in codec-haproxy from the Netty project. This flaw allows an attacker to build a malformed crafted message and cause infinite recursion, causing stack exhaustion and leading to a denial of service (DoS).
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/eap7-netty | <0:4.1.86-1.Final_redhat_00001.1.el8ea | 0:4.1.86-1.Final_redhat_00001.1.el8ea |
redhat/eap7-netty | <0:4.1.86-1.Final_redhat_00001.1.el9ea | 0:4.1.86-1.Final_redhat_00001.1.el9ea |
redhat/eap7-netty | <0:4.1.86-1.Final_redhat_00001.1.el7ea | 0:4.1.86-1.Final_redhat_00001.1.el7ea |
redhat/rh-sso7-keycloak | <0:18.0.7-1.redhat_00001.1.el7 | 0:18.0.7-1.redhat_00001.1.el7 |
redhat/rh-sso7-keycloak | <0:18.0.7-1.redhat_00001.1.el8 | 0:18.0.7-1.redhat_00001.1.el8 |
redhat/rh-sso7-keycloak | <0:18.0.7-1.redhat_00001.1.el9 | 0:18.0.7-1.redhat_00001.1.el9 |
Netty Netty | <4.1.86 | |
Debian Debian Linux | =10.0 | |
Debian Debian Linux | =11.0 | |
IBM Disconnected Log Collector | <=v1.0 - v1.8.2 | |
redhat/codec-haproxy | <4.1.86 | 4.1.86 |
debian/netty | 1:4.1.48-4+deb11u2 1:4.1.48-7+deb12u1 1:4.1.48-10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2022-41881 is a vulnerability found in Netty project versions prior to 4.1.86.Final.
CVE-2022-41881 has a severity level of high.
CVE-2022-41881 can lead to a StackOverflowError when parsing a malformed crafted message due to infinite recursion.
The remedy for CVE-2022-41881 is to update to Netty project version 4.1.86.Final.
More information about CVE-2022-41881 can be found at the following references: [1] [2] [3].