First published: Tue Dec 13 2022(Updated: )
Last updated 24 July 2024
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Netty Netty | >=4.1.83<4.1.86 | |
Debian Debian Linux | =10.0 | |
Debian Debian Linux | =11.0 | |
IBM Disconnected Log Collector | <=v1.0 - v1.8.2 | |
debian/netty | 1:4.1.48-4+deb11u2 1:4.1.48-7+deb12u1 1:4.1.48-10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-41915 is a vulnerability in the Netty project that allows malicious header values to bypass validation when using the DefaultHttpHeaders.set method with an iterator of values.
CVE-2022-41915 has a severity rating of high (7 out of 10).
Netty versions prior to 4.1.83.Final and starting from 4.1.48-5ubuntu0.1, 4.1.7-4ubuntu0.1+, 4.1.45-1ubuntu0.1~, 4.1.48-4+, 4.0.34-1ubuntu0.1~, 4.1.33-1+deb10u3, 4.1.48-4+deb11u1, and 4.1.48-7 are affected by CVE-2022-41915.
To fix CVE-2022-41915, update Netty to version 4.1.86.Final or later.
You can find more information about CVE-2022-41915 in the Netty project's security advisory and commit links provided.