Bug 2153379 (CVE-2022-41881)
Summary: | CVE-2022-41881 codec-haproxy: HAProxyMessageDecoder Stack Exhaustion DoS | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Patrick Del Bello <pdelbell> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED ERRATA | QA Contact: | |
Severity: | medium | Docs Contact: | |
Priority: | medium | ||
Version: | unspecified | CC: | aileenc, alazarot, anstephe, asoldano, avibelli, bbaranow, bgeorges, bmaxwell, boliveir, brian.stansberry, cdewolf, chazlett, clement.escoffier, dandread, darran.lofthouse, dkreling, dosoudil, emingora, fjuma, fmongiar, gjospin, gmalinko, gsmet, hamadhan, ibek, ivassile, iweiss, janstey, jcantril, jnethert, jpavlik, jpechane, jpoth, jrokos, jross, jstastny, jwon, kverlaen, lgao, lthon, max.andersen, mnovotny, mokumar, mosmerov, msochure, msvehla, nwallace, pdelbell, pdrozd, peholase, periklis, pgallagh, pjindal, pmackay, probinso, pskopek, rguimara, rjohnson, rrajasek, rruss, rstancel, rsvoboda, sbiarozk, sdouglas, smaestri, sthorger, tcunning, tom.jenkinson, yfang |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | codec-haproxy 4.1.86 | Doc Type: | --- |
Doc Text: |
A flaw was found in codec-haproxy from the Netty project. This flaw allows an attacker to build a malformed crafted message and cause infinite recursion, causing stack exhaustion and leading to a denial of service (DoS).
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | 2023-03-29 15:48:36 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | |||
Bug Blocks: | 2152729 |
Description
Patrick Del Bello
2022-12-14 13:45:17 UTC
This issue has been addressed in the following products: Red Hat Data Grid 8.4.1 Via RHSA-2023:0713 https://access.redhat.com/errata/RHSA-2023:0713 This issue has been addressed in the following products: Red Hat build of Quarkus Via RHSA-2023:0758 https://access.redhat.com/errata/RHSA-2023:0758 This issue has been addressed in the following products: Red Hat build of Eclipse Vert.x 4.3.7 Via RHSA-2023:0577 https://access.redhat.com/errata/RHSA-2023:0577 This issue has been addressed in the following products: CEQ 2.13.2-1 Via RHSA-2023:0888 https://access.redhat.com/errata/RHSA-2023:0888 This issue has been addressed in the following products: Red Hat JBoss Enterprise Application Platform 7.4 for RHEL 9 Via RHSA-2023:1514 https://access.redhat.com/errata/RHSA-2023:1514 This issue has been addressed in the following products: Red Hat JBoss Enterprise Application Platform 7.4 for RHEL 8 Via RHSA-2023:1513 https://access.redhat.com/errata/RHSA-2023:1513 This issue has been addressed in the following products: Red Hat JBoss Enterprise Application Platform 7.4 on RHEL 7 Via RHSA-2023:1512 https://access.redhat.com/errata/RHSA-2023:1512 This issue has been addressed in the following products: EAP 7.4.10 release Via RHSA-2023:1516 https://access.redhat.com/errata/RHSA-2023:1516 This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2022-41881 This issue has been addressed in the following products: RHINT Camel-Springboot 3.20.1 Via RHSA-2023:2100 https://access.redhat.com/errata/RHSA-2023:2100 This issue has been addressed in the following products: Red Hat Single Sign-On 7.6 for RHEL 8 Via RHSA-2023:2706 https://access.redhat.com/errata/RHSA-2023:2706 This issue has been addressed in the following products: Red Hat Single Sign-On 7.6 for RHEL 9 Via RHSA-2023:2707 https://access.redhat.com/errata/RHSA-2023:2707 This issue has been addressed in the following products: Red Hat Single Sign-On 7.6 for RHEL 7 Via RHSA-2023:2705 https://access.redhat.com/errata/RHSA-2023:2705 This issue has been addressed in the following products: Red Hat Single Sign-On Via RHSA-2023:2713 https://access.redhat.com/errata/RHSA-2023:2713 This issue has been addressed in the following products: RHEL-8 based Middleware Containers Via RHSA-2023:2710 https://access.redhat.com/errata/RHSA-2023:2710 This issue has been addressed in the following products: Migration Toolkit for Runtimes 1 on RHEL 8 Via RHSA-2023:3374 https://access.redhat.com/errata/RHSA-2023:3374 This issue has been addressed in the following products: Migration Toolkit for Runtimes 1 on RHEL 8 Via RHSA-2023:3373 https://access.redhat.com/errata/RHSA-2023:3373 This issue has been addressed in the following products: Red Hat Fuse 7.12 Via RHSA-2023:3954 https://access.redhat.com/errata/RHSA-2023:3954 This issue has been addressed in the following products: MTA-6.2-RHEL-9 MTA-6.2-RHEL-8 Via RHSA-2023:4627 https://access.redhat.com/errata/RHSA-2023:4627 This issue has been addressed in the following products: Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 Via RHSA-2025:1746 https://access.redhat.com/errata/RHSA-2025:1746 This issue has been addressed in the following products: Red Hat JBoss Enterprise Application Platform 7.3 EUS for RHEL 7 Via RHSA-2025:1747 https://access.redhat.com/errata/RHSA-2025:1747 |