<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for netty, netty-tcnative</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE-SU-2023:2096-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2023-05-04T07:09:25Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2023-05-04T07:09:25Z</InitialReleaseDate>
    <CurrentReleaseDate>2023-05-04T07:09:25Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for netty, netty-tcnative</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for netty, netty-tcnative fixes the following issues:

netty:

- Security fixes included in this version update from 4.1.75 to 4.1.90:
  * CVE-2022-24823: Local Information Disclosure Vulnerability in Netty on Unix-Like systems due temporary files for
    Java 6 and lower in io.netty:netty-codec-http (bsc#1199338)
  * CVE-2022-41881: HAProxyMessageDecoder Stack Exhaustion DoS (bsc#1206360)
  * CVE-2022-41915: HTTP Response splitting from assigning header value iterator (bsc#1206379)
    
- Other non-security bug fixes included in this version update from 4.1.75 to 4.1.90:
  * Build with Java 11 on ix86 architecture in order to avoid build failures 
  * Fix `HttpHeaders.names` for non-String headers
  * Fix `FlowControlHandler` behaviour to pass read events when auto-reading is turned off
  * Fix brotli compression
  * Fix a bug in FlowControlHandler that broke auto-read
  * Fix a potential memory leak bug has been in the pooled allocator
  * Fix a scalability issue caused by instanceof and check-cast checks that lead to false-sharing on the 
    `Klass::secondary_super_cache` field in the JVM
  * Fix a bug in our `PEMParser` when PEM files have multiple objects, and `BouncyCastle` is on the classpath
  * Fix several `NullPointerException` bugs
  * Fix a regression `SslContext` private key loading
  * Fix a bug in `SslContext` private key reading fall-back path
  * Fix a buffer leak regression in `HttpClientCodec`
  * Fix a bug where some `HttpMessage` implementations, that also implement `HttpContent`, were not handled correctly
  * Fix epoll bug when receiving zero-sized datagrams
  * Fix a bug in `SslHandler` so `handlerRemoved` works properly even if `handlerAdded` throws an exception
  * Fix an issue that allowed the multicast methods on `EpollDatagramChannel` to be called outside of an event-loop 
    thread
  * Fix a bug where an OPT record was added to DNS queries that already had such a record
  * Fix a bug that caused an error when files uploaded with HTTP POST contained a backslash in their name
  * Fix an issue in the `BlockHound` integration that could occasionally cause NetUtil to be reported as performing
    blocking operation. A similar `BlockHound` issue was fixed for the `JdkSslContext`
  * Fix a bug that prevented preface or settings frames from being flushed, when an HTTP2 connection was established
    with prior-knowledge
  * Fix a bug where Netty fails to load a shaded native library
  * Fix and relax overly strict HTTP/2 header validation check that was rejecting requests from Chrome and Firefox
  * Fix OpenSSL and BoringSSL implementations to respect the `jdk.tls.client.protocols` and `jdk.tls.server.protocols`
    system properties, making them react to these in the same way the JDK SSL provider does
  * Fix inconsitencies in how `epoll`, `kqueue`, and `NIO` handle RDHUP
  * For a more detailed list of changes please consult the official release notes:
    +  Changes from 4.1.90: https://netty.io/news/2023/03/14/4-1-90-Final.html
    +  Changes from 4.1.89: https://netty.io/news/2023/02/13/4-1-89-Final.html
    +  Changes from 4.1.88: https://netty.io/news/2023/02/12/4-1-88-Final.html
    +  Changes from 4.1.87: https://netty.io/news/2023/01/12/4-1-87-Final.html
    +  Changes from 4.1.86: https://netty.io/news/2022/12/12/4-1-86-Final.html
    +  Changes from 4.1.85: https://netty.io/news/2022/11/09/4-1-85-Final.html
    +  Changes from 4.1.84: https://netty.io/news/2022/10/11/4-1-84-Final.html
    +  Changes from 4.1.82: https://netty.io/news/2022/09/13/4-1-82-Final.html
    +  Changes from 4.1.81: https://netty.io/news/2022/09/08/4-1-81-Final.html
    +  Changes from 4.1.80: https://netty.io/news/2022/08/26/4-1-80-Final.html
    +  Changes from 4.1.79: https://netty.io/news/2022/07/11/4-1-79-Final.html
    +  Changes from 4.1.78: https://netty.io/news/2022/06/14/4-1-78-Final.html
    +  Changes from 4.1.77: https://netty.io/news/2022/05/06/2-1-77-Final.html
    +  Changes from 4.1.76: https://netty.io/news/2022/04/12/4-1-76-Final.html

netty-tcnative:
    
- New artifact named `netty-tcnative-classes`, provided by this update is required by netty 4.1.90 which contains 
  important security updates
- No formal changelog present. This artifact is closely bound to the netty releases
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">SUSE-2023-2096,SUSE-SLE-Module-Development-Tools-15-SP4-2023-2096,SUSE-SLE-Product-HPC-15-SP2-LTSS-2023-2096,SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-2096,SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-2096,SUSE-SLE-Product-RT-15-SP3-2023-2096,SUSE-SLE-Product-SLES-15-SP2-LTSS-2023-2096,SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-2096,SUSE-SLE-Product-SLES_SAP-15-SP2-2023-2096,SUSE-SLE-Product-SLES_SAP-15-SP3-2023-2096,SUSE-Storage-7-2023-2096,SUSE-Storage-7.1-2023-2096,openSUSE-SLE-15.4-2023-2096</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement/2023/suse-su-20232096-1/</URL>
      <Description>Link for SUSE-SU-2023:2096-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.suse.com/pipermail/sle-security-updates/2023-May/014770.html</URL>
      <Description>E-Mail link for SUSE-SU-2023:2096-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1199338</URL>
      <Description>SUSE Bug 1199338</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1206360</URL>
      <Description>SUSE Bug 1206360</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1206379</URL>
      <Description>SUSE Bug 1206379</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-24823/</URL>
      <Description>SUSE CVE CVE-2022-24823 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-41881/</URL>
      <Description>SUSE CVE CVE-2022-41881 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-41915/</URL>
      <Description>SUSE CVE CVE-2022-41915 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="SUSE Enterprise Storage 7">
      <Branch Type="Product Name" Name="SUSE Enterprise Storage 7">
        <FullProductName ProductID="SUSE Enterprise Storage 7" CPE="cpe:/o:suse:ses:7">SUSE Enterprise Storage 7</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Enterprise Storage 7.1">
      <Branch Type="Product Name" Name="SUSE Enterprise Storage 7.1">
        <FullProductName ProductID="SUSE Enterprise Storage 7.1" CPE="cpe:/o:suse:ses:7.1">SUSE Enterprise Storage 7.1</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS">
        <FullProductName ProductID="SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS" CPE="cpe:/o:suse:sle_hpc-ltss:15:sp2">SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS">
        <FullProductName ProductID="SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS" CPE="cpe:/o:suse:sle_hpc-espos:15:sp3">SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS">
        <FullProductName ProductID="SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS" CPE="cpe:/o:suse:sle_hpc-ltss:15:sp3">SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Module for Development Tools 15 SP4">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Module for Development Tools 15 SP4">
        <FullProductName ProductID="SUSE Linux Enterprise Module for Development Tools 15 SP4" CPE="cpe:/o:suse:sle-module-development-tools:15:sp4">SUSE Linux Enterprise Module for Development Tools 15 SP4</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Real Time 15 SP3">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Real Time 15 SP3">
        <FullProductName ProductID="SUSE Linux Enterprise Real Time 15 SP3" CPE="cpe:/o:suse:sle_rt:15:sp3">SUSE Linux Enterprise Real Time 15 SP3</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server 15 SP2-LTSS">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server 15 SP2-LTSS">
        <FullProductName ProductID="SUSE Linux Enterprise Server 15 SP2-LTSS" CPE="cpe:/o:suse:sles-ltss:15:sp2">SUSE Linux Enterprise Server 15 SP2-LTSS</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server 15 SP3-LTSS">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server 15 SP3-LTSS">
        <FullProductName ProductID="SUSE Linux Enterprise Server 15 SP3-LTSS" CPE="cpe:/o:suse:sles-ltss:15:sp3">SUSE Linux Enterprise Server 15 SP3-LTSS</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server for SAP Applications 15 SP2">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server for SAP Applications 15 SP2">
        <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 15 SP2" CPE="cpe:/o:suse:sles_sap:15:sp2">SUSE Linux Enterprise Server for SAP Applications 15 SP2</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server for SAP Applications 15 SP3">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server for SAP Applications 15 SP3">
        <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 15 SP3" CPE="cpe:/o:suse:sles_sap:15:sp3">SUSE Linux Enterprise Server for SAP Applications 15 SP3</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="openSUSE Leap 15.4">
      <Branch Type="Product Name" Name="openSUSE Leap 15.4">
        <FullProductName ProductID="openSUSE Leap 15.4" CPE="cpe:/o:opensuse:leap:15.4">openSUSE Leap 15.4</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="netty-4.1.90-150200.4.14.1">
      <FullProductName ProductID="netty-4.1.90-150200.4.14.1">netty-4.1.90-150200.4.14.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="netty-javadoc-4.1.90-150200.4.14.1">
      <FullProductName ProductID="netty-javadoc-4.1.90-150200.4.14.1">netty-javadoc-4.1.90-150200.4.14.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="netty-poms-4.1.90-150200.4.14.1">
      <FullProductName ProductID="netty-poms-4.1.90-150200.4.14.1">netty-poms-4.1.90-150200.4.14.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="netty-tcnative-2.0.59-150200.3.10.1">
      <FullProductName ProductID="netty-tcnative-2.0.59-150200.3.10.1">netty-tcnative-2.0.59-150200.3.10.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="netty-tcnative-javadoc-2.0.59-150200.3.10.1">
      <FullProductName ProductID="netty-tcnative-javadoc-2.0.59-150200.3.10.1">netty-tcnative-javadoc-2.0.59-150200.3.10.1</FullProductName>
    </Branch>
    <Relationship ProductReference="netty-tcnative-2.0.59-150200.3.10.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Enterprise Storage 7">
      <FullProductName ProductID="SUSE Enterprise Storage 7:netty-tcnative-2.0.59-150200.3.10.1">netty-tcnative-2.0.59-150200.3.10.1 as a component of SUSE Enterprise Storage 7</FullProductName>
    </Relationship>
    <Relationship ProductReference="netty-tcnative-2.0.59-150200.3.10.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Enterprise Storage 7.1">
      <FullProductName ProductID="SUSE Enterprise Storage 7.1:netty-tcnative-2.0.59-150200.3.10.1">netty-tcnative-2.0.59-150200.3.10.1 as a component of SUSE Enterprise Storage 7.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="netty-tcnative-2.0.59-150200.3.10.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:netty-tcnative-2.0.59-150200.3.10.1">netty-tcnative-2.0.59-150200.3.10.1 as a component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="netty-tcnative-2.0.59-150200.3.10.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS">
      <FullProductName ProductID="SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:netty-tcnative-2.0.59-150200.3.10.1">netty-tcnative-2.0.59-150200.3.10.1 as a component of SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS</FullProductName>
    </Relationship>
    <Relationship ProductReference="netty-tcnative-2.0.59-150200.3.10.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:netty-tcnative-2.0.59-150200.3.10.1">netty-tcnative-2.0.59-150200.3.10.1 as a component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="netty-tcnative-2.0.59-150200.3.10.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for Development Tools 15 SP4">
      <FullProductName ProductID="SUSE Linux Enterprise Module for Development Tools 15 SP4:netty-tcnative-2.0.59-150200.3.10.1">netty-tcnative-2.0.59-150200.3.10.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP4</FullProductName>
    </Relationship>
    <Relationship ProductReference="netty-tcnative-2.0.59-150200.3.10.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Real Time 15 SP3">
      <FullProductName ProductID="SUSE Linux Enterprise Real Time 15 SP3:netty-tcnative-2.0.59-150200.3.10.1">netty-tcnative-2.0.59-150200.3.10.1 as a component of SUSE Linux Enterprise Real Time 15 SP3</FullProductName>
    </Relationship>
    <Relationship ProductReference="netty-tcnative-2.0.59-150200.3.10.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 15 SP2-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 15 SP2-LTSS:netty-tcnative-2.0.59-150200.3.10.1">netty-tcnative-2.0.59-150200.3.10.1 as a component of SUSE Linux Enterprise Server 15 SP2-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="netty-tcnative-2.0.59-150200.3.10.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 15 SP3-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 15 SP3-LTSS:netty-tcnative-2.0.59-150200.3.10.1">netty-tcnative-2.0.59-150200.3.10.1 as a component of SUSE Linux Enterprise Server 15 SP3-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="netty-tcnative-2.0.59-150200.3.10.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 15 SP2">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 15 SP2:netty-tcnative-2.0.59-150200.3.10.1">netty-tcnative-2.0.59-150200.3.10.1 as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP2</FullProductName>
    </Relationship>
    <Relationship ProductReference="netty-tcnative-2.0.59-150200.3.10.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 15 SP3">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 15 SP3:netty-tcnative-2.0.59-150200.3.10.1">netty-tcnative-2.0.59-150200.3.10.1 as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP3</FullProductName>
    </Relationship>
    <Relationship ProductReference="netty-4.1.90-150200.4.14.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.4">
      <FullProductName ProductID="openSUSE Leap 15.4:netty-4.1.90-150200.4.14.1">netty-4.1.90-150200.4.14.1 as a component of openSUSE Leap 15.4</FullProductName>
    </Relationship>
    <Relationship ProductReference="netty-javadoc-4.1.90-150200.4.14.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.4">
      <FullProductName ProductID="openSUSE Leap 15.4:netty-javadoc-4.1.90-150200.4.14.1">netty-javadoc-4.1.90-150200.4.14.1 as a component of openSUSE Leap 15.4</FullProductName>
    </Relationship>
    <Relationship ProductReference="netty-poms-4.1.90-150200.4.14.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.4">
      <FullProductName ProductID="openSUSE Leap 15.4:netty-poms-4.1.90-150200.4.14.1">netty-poms-4.1.90-150200.4.14.1 as a component of openSUSE Leap 15.4</FullProductName>
    </Relationship>
    <Relationship ProductReference="netty-tcnative-2.0.59-150200.3.10.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.4">
      <FullProductName ProductID="openSUSE Leap 15.4:netty-tcnative-2.0.59-150200.3.10.1">netty-tcnative-2.0.59-150200.3.10.1 as a component of openSUSE Leap 15.4</FullProductName>
    </Relationship>
    <Relationship ProductReference="netty-tcnative-javadoc-2.0.59-150200.3.10.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.4">
      <FullProductName ProductID="openSUSE Leap 15.4:netty-tcnative-javadoc-2.0.59-150200.3.10.1">netty-tcnative-javadoc-2.0.59-150200.3.10.1 as a component of openSUSE Leap 15.4</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Netty is an open-source, asynchronous event-driven network application framework. The package `io.netty:netty-codec-http` prior to version 4.1.77.Final contains an insufficient fix for CVE-2021-21290. When Netty's multipart decoders are used local information disclosure can occur via the local system temporary directory if temporary storing uploads on the disk is enabled. This only impacts applications running on Java version 6 and lower. Additionally, this vulnerability impacts code running on Unix-like systems, and very old versions of Mac OSX and Windows as they all share the system temporary directory between all users. Version 4.1.77.Final contains a patch for this vulnerability. As a workaround, specify one's own `java.io.tmpdir` when starting the JVM or use DefaultHttpDataFactory.setBaseDir(...) to set the directory to something that is only readable by the current user.</Note>
    </Notes>
    <CVE>CVE-2022-24823</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Enterprise Storage 7.1:netty-tcnative-2.0.59-150200.3.10.1</ProductID>
        <ProductID>SUSE Enterprise Storage 7:netty-tcnative-2.0.59-150200.3.10.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:netty-tcnative-2.0.59-150200.3.10.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:netty-tcnative-2.0.59-150200.3.10.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:netty-tcnative-2.0.59-150200.3.10.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Development Tools 15 SP4:netty-tcnative-2.0.59-150200.3.10.1</ProductID>
        <ProductID>SUSE Linux Enterprise Real Time 15 SP3:netty-tcnative-2.0.59-150200.3.10.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP2-LTSS:netty-tcnative-2.0.59-150200.3.10.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP3-LTSS:netty-tcnative-2.0.59-150200.3.10.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP2:netty-tcnative-2.0.59-150200.3.10.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP3:netty-tcnative-2.0.59-150200.3.10.1</ProductID>
        <ProductID>openSUSE Leap 15.4:netty-4.1.90-150200.4.14.1</ProductID>
        <ProductID>openSUSE Leap 15.4:netty-javadoc-4.1.90-150200.4.14.1</ProductID>
        <ProductID>openSUSE Leap 15.4:netty-poms-4.1.90-150200.4.14.1</ProductID>
        <ProductID>openSUSE Leap 15.4:netty-tcnative-2.0.59-150200.3.10.1</ProductID>
        <ProductID>openSUSE Leap 15.4:netty-tcnative-javadoc-2.0.59-150200.3.10.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2023/suse-su-20232096-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-24823.html</URL>
        <Description>CVE-2022-24823</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1199338</URL>
        <Description>SUSE Bug 1199338</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Netty project is an event-driven asynchronous network application framework. In versions prior to 4.1.86.Final, a StackOverflowError can be raised when parsing a malformed crafted message due to an infinite recursion. This issue is patched in version 4.1.86.Final. There is no workaround, except using a custom HaProxyMessageDecoder.</Note>
    </Notes>
    <CVE>CVE-2022-41881</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Enterprise Storage 7.1:netty-tcnative-2.0.59-150200.3.10.1</ProductID>
        <ProductID>SUSE Enterprise Storage 7:netty-tcnative-2.0.59-150200.3.10.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:netty-tcnative-2.0.59-150200.3.10.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:netty-tcnative-2.0.59-150200.3.10.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:netty-tcnative-2.0.59-150200.3.10.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Development Tools 15 SP4:netty-tcnative-2.0.59-150200.3.10.1</ProductID>
        <ProductID>SUSE Linux Enterprise Real Time 15 SP3:netty-tcnative-2.0.59-150200.3.10.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP2-LTSS:netty-tcnative-2.0.59-150200.3.10.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP3-LTSS:netty-tcnative-2.0.59-150200.3.10.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP2:netty-tcnative-2.0.59-150200.3.10.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP3:netty-tcnative-2.0.59-150200.3.10.1</ProductID>
        <ProductID>openSUSE Leap 15.4:netty-4.1.90-150200.4.14.1</ProductID>
        <ProductID>openSUSE Leap 15.4:netty-javadoc-4.1.90-150200.4.14.1</ProductID>
        <ProductID>openSUSE Leap 15.4:netty-poms-4.1.90-150200.4.14.1</ProductID>
        <ProductID>openSUSE Leap 15.4:netty-tcnative-2.0.59-150200.3.10.1</ProductID>
        <ProductID>openSUSE Leap 15.4:netty-tcnative-javadoc-2.0.59-150200.3.10.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2023/suse-su-20232096-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-41881.html</URL>
        <Description>CVE-2022-41881</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1206360</URL>
        <Description>SUSE Bug 1206360</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Netty project is an event-driven asynchronous network application framework. Starting in version 4.1.83.Final and prior to 4.1.86.Final, when calling `DefaultHttpHeadesr.set` with an _iterator_ of values, header value validation was not performed, allowing malicious header values in the iterator to perform HTTP Response Splitting. This issue has been patched in version 4.1.86.Final. Integrators can work around the issue by changing the `DefaultHttpHeaders.set(CharSequence, Iterator&lt;?&gt;)` call, into a `remove()` call, and call `add()` in a loop over the iterator of values.</Note>
    </Notes>
    <CVE>CVE-2022-41915</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Enterprise Storage 7.1:netty-tcnative-2.0.59-150200.3.10.1</ProductID>
        <ProductID>SUSE Enterprise Storage 7:netty-tcnative-2.0.59-150200.3.10.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:netty-tcnative-2.0.59-150200.3.10.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:netty-tcnative-2.0.59-150200.3.10.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:netty-tcnative-2.0.59-150200.3.10.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Development Tools 15 SP4:netty-tcnative-2.0.59-150200.3.10.1</ProductID>
        <ProductID>SUSE Linux Enterprise Real Time 15 SP3:netty-tcnative-2.0.59-150200.3.10.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP2-LTSS:netty-tcnative-2.0.59-150200.3.10.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP3-LTSS:netty-tcnative-2.0.59-150200.3.10.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP2:netty-tcnative-2.0.59-150200.3.10.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP3:netty-tcnative-2.0.59-150200.3.10.1</ProductID>
        <ProductID>openSUSE Leap 15.4:netty-4.1.90-150200.4.14.1</ProductID>
        <ProductID>openSUSE Leap 15.4:netty-javadoc-4.1.90-150200.4.14.1</ProductID>
        <ProductID>openSUSE Leap 15.4:netty-poms-4.1.90-150200.4.14.1</ProductID>
        <ProductID>openSUSE Leap 15.4:netty-tcnative-2.0.59-150200.3.10.1</ProductID>
        <ProductID>openSUSE Leap 15.4:netty-tcnative-javadoc-2.0.59-150200.3.10.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2023/suse-su-20232096-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-41915.html</URL>
        <Description>CVE-2022-41915</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1206379</URL>
        <Description>SUSE Bug 1206379</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
