Description
Netty project is an event-driven asynchronous network application framework. In versions prior to 4.1.86.Final, a StackOverflowError can be raised when parsing a malformed crafted message due to an infinite recursion. This issue is patched in version 4.1.86.Final. There is no workaround, except using a custom HaProxyMessageDecoder.
Remediation
References
https://github.com/netty/netty/security/advisories/GHSA-fx2c-96vj-985v
https://lists.debian.org/debian-lts-announce/2023/01/msg00008.html
https://security.netapp.com/advisory/ntap-20230113-0004/
https://www.debian.org/security/2023/dsa-5316
Related Vulnerabilities
CVE-2021-39154 Vulnerability in maven package com.thoughtworks.xstream:xstream
CVE-2020-7608 Vulnerability in npm package yargs-parser
CVE-2022-23945 Vulnerability in maven package org.apache.shenyu:shenyu-common
CVE-2020-7680 Vulnerability in maven package org.webjars.npm:docsify
CVE-2021-43308 Vulnerability in npm package markdown-link-extractor