Vulnerability Description
Netty project is an event-driven asynchronous network application framework. In versions prior to 4.1.86.Final, a StackOverflowError can be raised when parsing a malformed crafted message due to an infinite recursion. This issue is patched in version 4.1.86.Final. There is no workaround, except using a custom HaProxyMessageDecoder.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Netty | Netty | < 4.1.86 |
| Debian | Debian Linux | 10.0 |
Related Weaknesses (CWE)
References
- https://github.com/netty/netty/security/advisories/GHSA-fx2c-96vj-985vExploitThird Party Advisory
- https://lists.debian.org/debian-lts-announce/2023/01/msg00008.htmlMailing ListThird Party Advisory
- https://security.netapp.com/advisory/ntap-20230113-0004/Third Party Advisory
- https://www.debian.org/security/2023/dsa-5316Third Party Advisory
- https://github.com/netty/netty/security/advisories/GHSA-fx2c-96vj-985vExploitThird Party Advisory
- https://lists.debian.org/debian-lts-announce/2023/01/msg00008.htmlMailing ListThird Party Advisory
- https://security.netapp.com/advisory/ntap-20230113-0004/Third Party Advisory
- https://www.debian.org/security/2023/dsa-5316Third Party Advisory
FAQ
What is CVE-2022-41881?
CVE-2022-41881 is a vulnerability with a CVSS score of 5.3 (MEDIUM). Netty project is an event-driven asynchronous network application framework. In versions prior to 4.1.86.Final, a StackOverflowError can be raised when parsing a malformed crafted message due to an in...
How severe is CVE-2022-41881?
CVE-2022-41881 has been rated MEDIUM with a CVSS base score of 5.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-41881?
Check the references section above for vendor advisories and patch information. Affected products include: Netty Netty, Debian Debian Linux.