Описание
Security update for netty, netty-tcnative
This update for netty, netty-tcnative fixes the following issues:
netty:
-
Security fixes included in this version update from 4.1.75 to 4.1.90:
- CVE-2022-24823: Local Information Disclosure Vulnerability in Netty on Unix-Like systems due temporary files for Java 6 and lower in io.netty:netty-codec-http (bsc#1199338)
- CVE-2022-41881: HAProxyMessageDecoder Stack Exhaustion DoS (bsc#1206360)
- CVE-2022-41915: HTTP Response splitting from assigning header value iterator (bsc#1206379)
-
Other non-security bug fixes included in this version update from 4.1.75 to 4.1.90:
- Build with Java 11 on ix86 architecture in order to avoid build failures
- Fix
HttpHeaders.names
for non-String headers - Fix
FlowControlHandler
behaviour to pass read events when auto-reading is turned off - Fix brotli compression
- Fix a bug in FlowControlHandler that broke auto-read
- Fix a potential memory leak bug has been in the pooled allocator
- Fix a scalability issue caused by instanceof and check-cast checks that lead to false-sharing on the
Klass::secondary_super_cache
field in the JVM - Fix a bug in our
PEMParser
when PEM files have multiple objects, andBouncyCastle
is on the classpath - Fix several
NullPointerException
bugs - Fix a regression
SslContext
private key loading - Fix a bug in
SslContext
private key reading fall-back path - Fix a buffer leak regression in
HttpClientCodec
- Fix a bug where some
HttpMessage
implementations, that also implementHttpContent
, were not handled correctly - Fix epoll bug when receiving zero-sized datagrams
- Fix a bug in
SslHandler
sohandlerRemoved
works properly even ifhandlerAdded
throws an exception - Fix an issue that allowed the multicast methods on
EpollDatagramChannel
to be called outside of an event-loop thread - Fix a bug where an OPT record was added to DNS queries that already had such a record
- Fix a bug that caused an error when files uploaded with HTTP POST contained a backslash in their name
- Fix an issue in the
BlockHound
integration that could occasionally cause NetUtil to be reported as performing blocking operation. A similarBlockHound
issue was fixed for theJdkSslContext
- Fix a bug that prevented preface or settings frames from being flushed, when an HTTP2 connection was established with prior-knowledge
- Fix a bug where Netty fails to load a shaded native library
- Fix and relax overly strict HTTP/2 header validation check that was rejecting requests from Chrome and Firefox
- Fix OpenSSL and BoringSSL implementations to respect the
jdk.tls.client.protocols
andjdk.tls.server.protocols
system properties, making them react to these in the same way the JDK SSL provider does - Fix inconsitencies in how
epoll
,kqueue
, andNIO
handle RDHUP - For a more detailed list of changes please consult the official release notes:
- Changes from 4.1.90: https://netty.io/news/2023/03/14/4-1-90-Final.html
- Changes from 4.1.89: https://netty.io/news/2023/02/13/4-1-89-Final.html
- Changes from 4.1.88: https://netty.io/news/2023/02/12/4-1-88-Final.html
- Changes from 4.1.87: https://netty.io/news/2023/01/12/4-1-87-Final.html
- Changes from 4.1.86: https://netty.io/news/2022/12/12/4-1-86-Final.html
- Changes from 4.1.85: https://netty.io/news/2022/11/09/4-1-85-Final.html
- Changes from 4.1.84: https://netty.io/news/2022/10/11/4-1-84-Final.html
- Changes from 4.1.82: https://netty.io/news/2022/09/13/4-1-82-Final.html
- Changes from 4.1.81: https://netty.io/news/2022/09/08/4-1-81-Final.html
- Changes from 4.1.80: https://netty.io/news/2022/08/26/4-1-80-Final.html
- Changes from 4.1.79: https://netty.io/news/2022/07/11/4-1-79-Final.html
- Changes from 4.1.78: https://netty.io/news/2022/06/14/4-1-78-Final.html
- Changes from 4.1.77: https://netty.io/news/2022/05/06/2-1-77-Final.html
- Changes from 4.1.76: https://netty.io/news/2022/04/12/4-1-76-Final.html
netty-tcnative:
- New artifact named
netty-tcnative-classes
, provided by this update is required by netty 4.1.90 which contains important security updates - No formal changelog present. This artifact is closely bound to the netty releases
Список пакетов
Container suse/manager/5.0/x86_64/server:latest
Image server-image
SUSE Enterprise Storage 7
SUSE Enterprise Storage 7.1
SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS
SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS
SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS
SUSE Linux Enterprise Module for Development Tools 15 SP4
SUSE Linux Enterprise Real Time 15 SP3
SUSE Linux Enterprise Server 15 SP2-LTSS
SUSE Linux Enterprise Server 15 SP3-LTSS
SUSE Linux Enterprise Server for SAP Applications 15 SP2
SUSE Linux Enterprise Server for SAP Applications 15 SP3
openSUSE Leap 15.4
Ссылки
- Link for SUSE-SU-2023:2096-1
- E-Mail link for SUSE-SU-2023:2096-1
- SUSE Security Ratings
- SUSE Bug 1199338
- SUSE Bug 1206360
- SUSE Bug 1206379
- SUSE CVE CVE-2022-24823 page
- SUSE CVE CVE-2022-41881 page
- SUSE CVE CVE-2022-41915 page
Описание
Netty is an open-source, asynchronous event-driven network application framework. The package `io.netty:netty-codec-http` prior to version 4.1.77.Final contains an insufficient fix for CVE-2021-21290. When Netty's multipart decoders are used local information disclosure can occur via the local system temporary directory if temporary storing uploads on the disk is enabled. This only impacts applications running on Java version 6 and lower. Additionally, this vulnerability impacts code running on Unix-like systems, and very old versions of Mac OSX and Windows as they all share the system temporary directory between all users. Version 4.1.77.Final contains a patch for this vulnerability. As a workaround, specify one's own `java.io.tmpdir` when starting the JVM or use DefaultHttpDataFactory.setBaseDir(...) to set the directory to something that is only readable by the current user.
Затронутые продукты
Ссылки
- CVE-2022-24823
- SUSE Bug 1199338
Описание
Netty project is an event-driven asynchronous network application framework. In versions prior to 4.1.86.Final, a StackOverflowError can be raised when parsing a malformed crafted message due to an infinite recursion. This issue is patched in version 4.1.86.Final. There is no workaround, except using a custom HaProxyMessageDecoder.
Затронутые продукты
Ссылки
- CVE-2022-41881
- SUSE Bug 1206360
Описание
Netty project is an event-driven asynchronous network application framework. Starting in version 4.1.83.Final and prior to 4.1.86.Final, when calling `DefaultHttpHeadesr.set` with an _iterator_ of values, header value validation was not performed, allowing malicious header values in the iterator to perform HTTP Response Splitting. This issue has been patched in version 4.1.86.Final. Integrators can work around the issue by changing the `DefaultHttpHeaders.set(CharSequence, Iterator<?>)` call, into a `remove()` call, and call `add()` in a loop over the iterator of values.
Затронутые продукты
Ссылки
- CVE-2022-41915
- SUSE Bug 1206379