Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2022-41915

Опубликовано: 13 дек. 2022
Источник: ubuntu
Приоритет: medium
CVSS3: 6.5

Описание

Netty project is an event-driven asynchronous network application framework. Starting in version 4.1.83.Final and prior to 4.1.86.Final, when calling DefaultHttpHeadesr.set with an iterator of values, header value validation was not performed, allowing malicious header values in the iterator to perform HTTP Response Splitting. This issue has been patched in version 4.1.86.Final. Integrators can work around the issue by changing the DefaultHttpHeaders.set(CharSequence, Iterator<?>) call, into a remove() call, and call add() in a loop over the iterator of values.

РелизСтатусПримечание
bionic

ignored

end of standard support, was needs-triage
devel

released

4.1.48-6
esm-apps/bionic

released

1:4.1.7-4ubuntu0.1+esm2
esm-apps/focal

released

1:4.1.45-1ubuntu0.1~esm1
esm-apps/jammy

released

1:4.1.48-4+deb11u1build0.22.04.1
esm-apps/noble

released

4.1.48-6
esm-apps/xenial

released

1:4.0.34-1ubuntu0.1~esm1
esm-infra-legacy/trusty

not-affected

code not present
focal

ignored

end of standard support, was needed
jammy

released

1:4.1.48-4+deb11u1build0.22.04.1

Показывать по

РелизСтатусПримечание
bionic

ignored

end of standard support, was needs-triage
esm-apps/bionic

needs-triage

esm-apps/xenial

needs-triage

esm-infra/focal

DNE

focal

DNE

jammy

DNE

kinetic

DNE

trusty

ignored

end of standard support
upstream

needs-triage

xenial

ignored

end of standard support

Показывать по

6.5 Medium

CVSS3

Связанные уязвимости

CVSS3: 6.5
nvd
больше 2 лет назад

Netty project is an event-driven asynchronous network application framework. Starting in version 4.1.83.Final and prior to 4.1.86.Final, when calling `DefaultHttpHeadesr.set` with an _iterator_ of values, header value validation was not performed, allowing malicious header values in the iterator to perform HTTP Response Splitting. This issue has been patched in version 4.1.86.Final. Integrators can work around the issue by changing the `DefaultHttpHeaders.set(CharSequence, Iterator<?>)` call, into a `remove()` call, and call `add()` in a loop over the iterator of values.

CVSS3: 6.5
debian
больше 2 лет назад

Netty project is an event-driven asynchronous network application fram ...

CVSS3: 6.5
github
больше 2 лет назад

Netty vulnerable to HTTP Response splitting from assigning header value iterator

CVSS3: 6.5
fstec
больше 2 лет назад

Уязвимость сетевого программного средства Netty, связанная с возникновением конфликта интерпретаций, позволяющая нарушителю раскрыть и модифицировать защищаемую информацию

suse-cvrf
около 2 лет назад

Security update for netty, netty-tcnative

6.5 Medium

CVSS3

Уязвимость CVE-2022-41915