{"affected":[{"ecosystem_specific":{"binaries":[{"netty-tcnative":"2.0.59-150200.3.10.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Module for Development Tools 15 SP4","name":"netty-tcnative","purl":"pkg:rpm/suse/netty-tcnative&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Development%20Tools%2015%20SP4"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"2.0.59-150200.3.10.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"netty-tcnative":"2.0.59-150200.3.10.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise High Performance Computing 15 SP2-LTSS","name":"netty-tcnative","purl":"pkg:rpm/suse/netty-tcnative&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP2-LTSS"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"2.0.59-150200.3.10.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"netty-tcnative":"2.0.59-150200.3.10.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise High Performance Computing 15 SP3-ESPOS","name":"netty-tcnative","purl":"pkg:rpm/suse/netty-tcnative&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP3-ESPOS"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"2.0.59-150200.3.10.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"netty-tcnative":"2.0.59-150200.3.10.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise High Performance Computing 15 SP3-LTSS","name":"netty-tcnative","purl":"pkg:rpm/suse/netty-tcnative&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP3-LTSS"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"2.0.59-150200.3.10.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"netty-tcnative":"2.0.59-150200.3.10.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Real Time 15 SP3","name":"netty-tcnative","purl":"pkg:rpm/suse/netty-tcnative&distro=SUSE%20Linux%20Enterprise%20Real%20Time%2015%20SP3"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"2.0.59-150200.3.10.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"netty-tcnative":"2.0.59-150200.3.10.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 15 SP2-LTSS","name":"netty-tcnative","purl":"pkg:rpm/suse/netty-tcnative&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP2-LTSS"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"2.0.59-150200.3.10.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"netty-tcnative":"2.0.59-150200.3.10.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 15 SP3-LTSS","name":"netty-tcnative","purl":"pkg:rpm/suse/netty-tcnative&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP3-LTSS"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"2.0.59-150200.3.10.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"netty-tcnative":"2.0.59-150200.3.10.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 15 SP2","name":"netty-tcnative","purl":"pkg:rpm/suse/netty-tcnative&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP2"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"2.0.59-150200.3.10.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"netty-tcnative":"2.0.59-150200.3.10.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 15 SP3","name":"netty-tcnative","purl":"pkg:rpm/suse/netty-tcnative&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP3"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"2.0.59-150200.3.10.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"netty-tcnative":"2.0.59-150200.3.10.1"}]},"package":{"ecosystem":"SUSE:Enterprise Storage 7","name":"netty-tcnative","purl":"pkg:rpm/suse/netty-tcnative&distro=SUSE%20Enterprise%20Storage%207"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"2.0.59-150200.3.10.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"netty-tcnative":"2.0.59-150200.3.10.1"}]},"package":{"ecosystem":"SUSE:Enterprise Storage 7.1","name":"netty-tcnative","purl":"pkg:rpm/suse/netty-tcnative&distro=SUSE%20Enterprise%20Storage%207.1"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"2.0.59-150200.3.10.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"netty":"4.1.90-150200.4.14.1","netty-javadoc":"4.1.90-150200.4.14.1","netty-poms":"4.1.90-150200.4.14.1","netty-tcnative":"2.0.59-150200.3.10.1","netty-tcnative-javadoc":"2.0.59-150200.3.10.1"}]},"package":{"ecosystem":"openSUSE:Leap 15.4","name":"netty","purl":"pkg:rpm/opensuse/netty&distro=openSUSE%20Leap%2015.4"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.1.90-150200.4.14.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"netty":"4.1.90-150200.4.14.1","netty-javadoc":"4.1.90-150200.4.14.1","netty-poms":"4.1.90-150200.4.14.1","netty-tcnative":"2.0.59-150200.3.10.1","netty-tcnative-javadoc":"2.0.59-150200.3.10.1"}]},"package":{"ecosystem":"openSUSE:Leap 15.4","name":"netty-tcnative","purl":"pkg:rpm/opensuse/netty-tcnative&distro=openSUSE%20Leap%2015.4"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"2.0.59-150200.3.10.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for netty, netty-tcnative fixes the following issues:\n\nnetty:\n\n- Security fixes included in this version update from 4.1.75 to 4.1.90:\n  * CVE-2022-24823: Local Information Disclosure Vulnerability in Netty on Unix-Like systems due temporary files for\n    Java 6 and lower in io.netty:netty-codec-http (bsc#1199338)\n  * CVE-2022-41881: HAProxyMessageDecoder Stack Exhaustion DoS (bsc#1206360)\n  * CVE-2022-41915: HTTP Response splitting from assigning header value iterator (bsc#1206379)\n    \n- Other non-security bug fixes included in this version update from 4.1.75 to 4.1.90:\n  * Build with Java 11 on ix86 architecture in order to avoid build failures \n  * Fix `HttpHeaders.names` for non-String headers\n  * Fix `FlowControlHandler` behaviour to pass read events when auto-reading is turned off\n  * Fix brotli compression\n  * Fix a bug in FlowControlHandler that broke auto-read\n  * Fix a potential memory leak bug has been in the pooled allocator\n  * Fix a scalability issue caused by instanceof and check-cast checks that lead to false-sharing on the \n    `Klass::secondary_super_cache` field in the JVM\n  * Fix a bug in our `PEMParser` when PEM files have multiple objects, and `BouncyCastle` is on the classpath\n  * Fix several `NullPointerException` bugs\n  * Fix a regression `SslContext` private key loading\n  * Fix a bug in `SslContext` private key reading fall-back path\n  * Fix a buffer leak regression in `HttpClientCodec`\n  * Fix a bug where some `HttpMessage` implementations, that also implement `HttpContent`, were not handled correctly\n  * Fix epoll bug when receiving zero-sized datagrams\n  * Fix a bug in `SslHandler` so `handlerRemoved` works properly even if `handlerAdded` throws an exception\n  * Fix an issue that allowed the multicast methods on `EpollDatagramChannel` to be called outside of an event-loop \n    thread\n  * Fix a bug where an OPT record was added to DNS queries that already had such a record\n  * Fix a bug that caused an error when files uploaded with HTTP POST contained a backslash in their name\n  * Fix an issue in the `BlockHound` integration that could occasionally cause NetUtil to be reported as performing\n    blocking operation. A similar `BlockHound` issue was fixed for the `JdkSslContext`\n  * Fix a bug that prevented preface or settings frames from being flushed, when an HTTP2 connection was established\n    with prior-knowledge\n  * Fix a bug where Netty fails to load a shaded native library\n  * Fix and relax overly strict HTTP/2 header validation check that was rejecting requests from Chrome and Firefox\n  * Fix OpenSSL and BoringSSL implementations to respect the `jdk.tls.client.protocols` and `jdk.tls.server.protocols`\n    system properties, making them react to these in the same way the JDK SSL provider does\n  * Fix inconsitencies in how `epoll`, `kqueue`, and `NIO` handle RDHUP\n  * For a more detailed list of changes please consult the official release notes:\n    +  Changes from 4.1.90: https://netty.io/news/2023/03/14/4-1-90-Final.html\n    +  Changes from 4.1.89: https://netty.io/news/2023/02/13/4-1-89-Final.html\n    +  Changes from 4.1.88: https://netty.io/news/2023/02/12/4-1-88-Final.html\n    +  Changes from 4.1.87: https://netty.io/news/2023/01/12/4-1-87-Final.html\n    +  Changes from 4.1.86: https://netty.io/news/2022/12/12/4-1-86-Final.html\n    +  Changes from 4.1.85: https://netty.io/news/2022/11/09/4-1-85-Final.html\n    +  Changes from 4.1.84: https://netty.io/news/2022/10/11/4-1-84-Final.html\n    +  Changes from 4.1.82: https://netty.io/news/2022/09/13/4-1-82-Final.html\n    +  Changes from 4.1.81: https://netty.io/news/2022/09/08/4-1-81-Final.html\n    +  Changes from 4.1.80: https://netty.io/news/2022/08/26/4-1-80-Final.html\n    +  Changes from 4.1.79: https://netty.io/news/2022/07/11/4-1-79-Final.html\n    +  Changes from 4.1.78: https://netty.io/news/2022/06/14/4-1-78-Final.html\n    +  Changes from 4.1.77: https://netty.io/news/2022/05/06/2-1-77-Final.html\n    +  Changes from 4.1.76: https://netty.io/news/2022/04/12/4-1-76-Final.html\n\nnetty-tcnative:\n    \n- New artifact named `netty-tcnative-classes`, provided by this update is required by netty 4.1.90 which contains \n  important security updates\n- No formal changelog present. This artifact is closely bound to the netty releases\n","id":"SUSE-SU-2023:2096-1","modified":"2023-05-04T07:09:25Z","published":"2023-05-04T07:09:25Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2023/suse-su-20232096-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1199338"},{"type":"REPORT","url":"https://bugzilla.suse.com/1206360"},{"type":"REPORT","url":"https://bugzilla.suse.com/1206379"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-24823"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-41881"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-41915"}],"related":["CVE-2022-24823","CVE-2022-41881","CVE-2022-41915"],"summary":"Security update for netty, netty-tcnative","upstream":["CVE-2022-24823","CVE-2022-41881","CVE-2022-41915"]}