SUSE-SU-2023:2096-1: important: Security update for netty, netty-tcnative

sle-updates at lists.suse.com sle-updates at lists.suse.com
Mon May 8 09:05:16 UTC 2023



# Security update for netty, netty-tcnative

Announcement ID: SUSE-SU-2023:2096-1  
Rating: important  
References:

  * #1199338
  * #1206360
  * #1206379

  
Cross-References:

  * CVE-2022-24823
  * CVE-2022-41881
  * CVE-2022-41915

  
CVSS scores:

  * CVE-2022-24823 ( SUSE ):  6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
  * CVE-2022-24823 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
  * CVE-2022-41881 ( SUSE ):  7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-41881 ( NVD ):  5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
  * CVE-2022-41915 ( SUSE ):  7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
  * CVE-2022-41915 ( NVD ):  6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N

  
Affected Products:

  * Development Tools Module 15-SP4
  * openSUSE Leap 15.4
  * SUSE Enterprise Storage 7
  * SUSE Enterprise Storage 7.1
  * SUSE Linux Enterprise Desktop 15 SP4
  * SUSE Linux Enterprise High Performance Computing 15 SP2
  * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2
  * SUSE Linux Enterprise High Performance Computing 15 SP3
  * SUSE Linux Enterprise High Performance Computing 15 SP4
  * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3
  * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
  * SUSE Linux Enterprise Real Time 15 SP3
  * SUSE Linux Enterprise Real Time 15 SP4
  * SUSE Linux Enterprise Server 15 SP2
  * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2
  * SUSE Linux Enterprise Server 15 SP3
  * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
  * SUSE Linux Enterprise Server 15 SP4
  * SUSE Linux Enterprise Server for SAP Applications 15 SP2
  * SUSE Linux Enterprise Server for SAP Applications 15 SP3
  * SUSE Linux Enterprise Server for SAP Applications 15 SP4
  * SUSE Manager Proxy 4.3
  * SUSE Manager Retail Branch Server 4.3
  * SUSE Manager Server 4.3

  
  
An update that solves three vulnerabilities and contains one feature can now be
installed.

## Description:

This update for netty, netty-tcnative fixes the following issues:

netty:

  * Security fixes included in this version update from 4.1.75 to 4.1.90:
  * CVE-2022-24823: Local Information Disclosure Vulnerability in Netty on Unix-
    Like systems due temporary files for Java 6 and lower in io.netty:netty-
    codec-http (bsc#1199338)
  * CVE-2022-41881: HAProxyMessageDecoder Stack Exhaustion DoS (bsc#1206360)
  * CVE-2022-41915: HTTP Response splitting from assigning header value iterator
    (bsc#1206379)

  * Other non-security bug fixes included in this version update from 4.1.75 to
    4.1.90:

  * Build with Java 11 on ix86 architecture in order to avoid build failures
  * Fix `HttpHeaders.names` for non-String headers
  * Fix `FlowControlHandler` behaviour to pass read events when auto-reading is
    turned off
  * Fix brotli compression
  * Fix a bug in FlowControlHandler that broke auto-read
  * Fix a potential memory leak bug has been in the pooled allocator
  * Fix a scalability issue caused by instanceof and check-cast checks that lead
    to false-sharing on the `Klass::secondary_super_cache` field in the JVM
  * Fix a bug in our `PEMParser` when PEM files have multiple objects, and
    `BouncyCastle` is on the classpath
  * Fix several `NullPointerException` bugs
  * Fix a regression `SslContext` private key loading
  * Fix a bug in `SslContext` private key reading fall-back path
  * Fix a buffer leak regression in `HttpClientCodec`
  * Fix a bug where some `HttpMessage` implementations, that also implement
    `HttpContent`, were not handled correctly
  * Fix epoll bug when receiving zero-sized datagrams
  * Fix a bug in `SslHandler` so `handlerRemoved` works properly even if
    `handlerAdded` throws an exception
  * Fix an issue that allowed the multicast methods on `EpollDatagramChannel` to
    be called outside of an event-loop thread
  * Fix a bug where an OPT record was added to DNS queries that already had such
    a record
  * Fix a bug that caused an error when files uploaded with HTTP POST contained
    a backslash in their name
  * Fix an issue in the `BlockHound` integration that could occasionally cause
    NetUtil to be reported as performing blocking operation. A similar
    `BlockHound` issue was fixed for the `JdkSslContext`
  * Fix a bug that prevented preface or settings frames from being flushed, when
    an HTTP2 connection was established with prior-knowledge
  * Fix a bug where Netty fails to load a shaded native library
  * Fix and relax overly strict HTTP/2 header validation check that was
    rejecting requests from Chrome and Firefox
  * Fix OpenSSL and BoringSSL implementations to respect the
    `jdk.tls.client.protocols` and `jdk.tls.server.protocols` system properties,
    making them react to these in the same way the JDK SSL provider does
  * Fix inconsitencies in how `epoll`, `kqueue`, and `NIO` handle RDHUP
  * For a more detailed list of changes please consult the official release
    notes:
    * Changes from 4.1.90: https://netty.io/news/2023/03/14/4-1-90-Final.html
    * Changes from 4.1.89: https://netty.io/news/2023/02/13/4-1-89-Final.html
    * Changes from 4.1.88: https://netty.io/news/2023/02/12/4-1-88-Final.html
    * Changes from 4.1.87: https://netty.io/news/2023/01/12/4-1-87-Final.html
    * Changes from 4.1.86: https://netty.io/news/2022/12/12/4-1-86-Final.html
    * Changes from 4.1.85: https://netty.io/news/2022/11/09/4-1-85-Final.html
    * Changes from 4.1.84: https://netty.io/news/2022/10/11/4-1-84-Final.html
    * Changes from 4.1.82: https://netty.io/news/2022/09/13/4-1-82-Final.html
    * Changes from 4.1.81: https://netty.io/news/2022/09/08/4-1-81-Final.html
    * Changes from 4.1.80: https://netty.io/news/2022/08/26/4-1-80-Final.html
    * Changes from 4.1.79: https://netty.io/news/2022/07/11/4-1-79-Final.html
    * Changes from 4.1.78: https://netty.io/news/2022/06/14/4-1-78-Final.html
    * Changes from 4.1.77: https://netty.io/news/2022/05/06/2-1-77-Final.html
    * Changes from 4.1.76: https://netty.io/news/2022/04/12/4-1-76-Final.html

netty-tcnative:

  * New artifact named `netty-tcnative-classes`, provided by this update is
    required by netty 4.1.90 which contains important security updates
  * No formal changelog present. This artifact is closely bound to the netty
    releases

## Patch Instructions:

To install this SUSE Important update use the SUSE recommended installation
methods like YaST online_update or "zypper patch".  
Alternatively you can run the command listed for your product:

  * openSUSE Leap 15.4  
    zypper in -t patch openSUSE-SLE-15.4-2023-2096=1

  * Development Tools Module 15-SP4  
    zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP4-2023-2096=1

  * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2  
    zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2023-2096=1

  * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3  
    zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-2096=1

  * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3  
    zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-2096=1

  * SUSE Linux Enterprise Real Time 15 SP3  
    zypper in -t patch SUSE-SLE-Product-RT-15-SP3-2023-2096=1

  * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2  
    zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2023-2096=1

  * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3  
    zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-2096=1

  * SUSE Linux Enterprise Server for SAP Applications 15 SP2  
    zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2023-2096=1

  * SUSE Linux Enterprise Server for SAP Applications 15 SP3  
    zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2023-2096=1

  * SUSE Enterprise Storage 7.1  
    zypper in -t patch SUSE-Storage-7.1-2023-2096=1

  * SUSE Enterprise Storage 7  
    zypper in -t patch SUSE-Storage-7-2023-2096=1

## Package List:

  * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64)
    * netty-tcnative-2.0.59-150200.3.10.1
    * netty-4.1.90-150200.4.14.1
  * openSUSE Leap 15.4 (noarch)
    * netty-tcnative-javadoc-2.0.59-150200.3.10.1
    * netty-poms-4.1.90-150200.4.14.1
    * netty-javadoc-4.1.90-150200.4.14.1
  * Development Tools Module 15-SP4 (aarch64 ppc64le s390x x86_64)
    * netty-tcnative-2.0.59-150200.3.10.1
  * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (aarch64
    x86_64)
    * netty-tcnative-2.0.59-150200.3.10.1
  * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 (aarch64
    x86_64)
    * netty-tcnative-2.0.59-150200.3.10.1
  * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64
    x86_64)
    * netty-tcnative-2.0.59-150200.3.10.1
  * SUSE Linux Enterprise Real Time 15 SP3 (x86_64)
    * netty-tcnative-2.0.59-150200.3.10.1
  * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 ppc64le s390x
    x86_64)
    * netty-tcnative-2.0.59-150200.3.10.1
  * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x
    x86_64)
    * netty-tcnative-2.0.59-150200.3.10.1
  * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (ppc64le x86_64)
    * netty-tcnative-2.0.59-150200.3.10.1
  * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64)
    * netty-tcnative-2.0.59-150200.3.10.1
  * SUSE Enterprise Storage 7.1 (aarch64 x86_64)
    * netty-tcnative-2.0.59-150200.3.10.1
  * SUSE Enterprise Storage 7 (aarch64 x86_64)
    * netty-tcnative-2.0.59-150200.3.10.1

## References:

  * https://www.suse.com/security/cve/CVE-2022-24823.html
  * https://www.suse.com/security/cve/CVE-2022-41881.html
  * https://www.suse.com/security/cve/CVE-2022-41915.html
  * https://bugzilla.suse.com/show_bug.cgi?id=1199338
  * https://bugzilla.suse.com/show_bug.cgi?id=1206360
  * https://bugzilla.suse.com/show_bug.cgi?id=1206379
  * https://jira.suse.com/browse/SLE-23217

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.suse.com/pipermail/sle-updates/attachments/20230508/ce6f9e52/attachment.htm>


More information about the sle-updates mailing list