"-Synchronized-Data."

This commit is contained in:
CVE Team 2023-01-12 01:00:38 +00:00
parent 87901724df
commit dcdc134dfb
No known key found for this signature in database
GPG Key ID: E3252B3D49582C98
6 changed files with 129 additions and 86 deletions

View File

@ -99,6 +99,11 @@
"url": "https://www.oracle.com/security-alerts/cpujul2022.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpujul2022.html"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20230111 [SECURITY] [DLA 3268-1] netty security update",
"url": "https://lists.debian.org/debian-lts-announce/2023/01/msg00008.html"
}
]
},

View File

@ -99,6 +99,11 @@
"url": "https://www.oracle.com/security-alerts/cpujul2022.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpujul2022.html"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20230111 [SECURITY] [DLA 3268-1] netty security update",
"url": "https://lists.debian.org/debian-lts-announce/2023/01/msg00008.html"
}
]
},

View File

@ -93,6 +93,11 @@
"url": "https://www.oracle.com/security-alerts/cpujul2022.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpujul2022.html"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20230111 [SECURITY] [DLA 3268-1] netty security update",
"url": "https://lists.debian.org/debian-lts-announce/2023/01/msg00008.html"
}
]
},

View File

@ -58,6 +58,11 @@
"url": "https://github.com/netty/netty/security/advisories/GHSA-fx2c-96vj-985v",
"refsource": "MISC",
"name": "https://github.com/netty/netty/security/advisories/GHSA-fx2c-96vj-985v"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20230111 [SECURITY] [DLA 3268-1] netty security update",
"url": "https://lists.debian.org/debian-lts-announce/2023/01/msg00008.html"
}
]
},

View File

@ -3,106 +3,111 @@
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2022-41915",
"ASSIGNER": "security-advisories@github.com",
"STATE": "PUBLIC"
"ID": "CVE-2022-41915",
"ASSIGNER": "security-advisories@github.com",
"STATE": "PUBLIC"
},
"source": {
"advisory": "GHSA-hh82-3pmq-7frp",
"discovery": "UNKNOWN"
"advisory": "GHSA-hh82-3pmq-7frp",
"discovery": "UNKNOWN"
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "netty",
"product": {
"product_data": [
"vendor": {
"vendor_data": [
{
"product_name": "netty",
"version": {
"version_data": [
{
"version_name": "4.1.86.Final",
"version_affected": "<",
"version_value": "4.1.86.Final",
"platform": ""
},
{
"version_name": "4.1.83.Final",
"version_affected": ">=",
"version_value": "4.1.83.Final",
"platform": ""
}
]
}
"vendor_name": "netty",
"product": {
"product_data": [
{
"product_name": "netty",
"version": {
"version_data": [
{
"version_name": "4.1.86.Final",
"version_affected": "<",
"version_value": "4.1.86.Final",
"platform": ""
},
{
"version_name": "4.1.83.Final",
"version_affected": ">=",
"version_value": "4.1.83.Final",
"platform": ""
}
]
}
}
]
}
}
]
}
}
]
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
"problemtype_data": [
{
"lang": "eng",
"value": "CWE-436: Interpretation Conflict",
"cweId": "CWE-436"
}
]
},
{
"description": [
"description": [
{
"lang": "eng",
"value": "CWE-436: Interpretation Conflict",
"cweId": "CWE-436"
}
]
},
{
"lang": "eng",
"value": "CWE-113: Improper Neutralization of CRLF Sequences in HTTP Headers ('HTTP Response Splitting')",
"cweId": "CWE-113"
"description": [
{
"lang": "eng",
"value": "CWE-113: Improper Neutralization of CRLF Sequences in HTTP Headers ('HTTP Response Splitting')",
"cweId": "CWE-113"
}
]
}
]
}
]
]
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "Netty project is an event-driven asynchronous network application framework. Starting in version 4.1.83.Final and prior to 4.1.86.Final, when calling `DefaultHttpHeadesr.set` with an _iterator_ of values, header value validation was not performed, allowing malicious header values in the iterator to perform HTTP Response Splitting. This issue has been patched in version 4.1.86.Final. Integrators can work around the issue by changing the `DefaultHttpHeaders.set(CharSequence, Iterator<?>)` call, into a `remove()` call, and call `add()` in a loop over the iterator of values."
}
]
"description_data": [
{
"lang": "eng",
"value": "Netty project is an event-driven asynchronous network application framework. Starting in version 4.1.83.Final and prior to 4.1.86.Final, when calling `DefaultHttpHeadesr.set` with an _iterator_ of values, header value validation was not performed, allowing malicious header values in the iterator to perform HTTP Response Splitting. This issue has been patched in version 4.1.86.Final. Integrators can work around the issue by changing the `DefaultHttpHeaders.set(CharSequence, Iterator<?>)` call, into a `remove()` call, and call `add()` in a loop over the iterator of values."
}
]
},
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://github.com/netty/netty/security/advisories/GHSA-hh82-3pmq-7frp",
"name": "https://github.com/netty/netty/security/advisories/GHSA-hh82-3pmq-7frp"
},
{
"refsource": "MISC",
"url": "https://github.com/netty/netty/issues/13084",
"name": "https://github.com/netty/netty/issues/13084"
},
{
"refsource": "MISC",
"url": "https://github.com/netty/netty/pull/12760",
"name": "https://github.com/netty/netty/pull/12760"
},
{
"refsource": "MISC",
"url": "https://github.com/netty/netty/commit/fe18adff1c2b333acb135ab779a3b9ba3295a1c4",
"name": "https://github.com/netty/netty/commit/fe18adff1c2b333acb135ab779a3b9ba3295a1c4"
}
]
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://github.com/netty/netty/security/advisories/GHSA-hh82-3pmq-7frp",
"name": "https://github.com/netty/netty/security/advisories/GHSA-hh82-3pmq-7frp"
},
{
"refsource": "MISC",
"url": "https://github.com/netty/netty/issues/13084",
"name": "https://github.com/netty/netty/issues/13084"
},
{
"refsource": "MISC",
"url": "https://github.com/netty/netty/pull/12760",
"name": "https://github.com/netty/netty/pull/12760"
},
{
"refsource": "MISC",
"url": "https://github.com/netty/netty/commit/fe18adff1c2b333acb135ab779a3b9ba3295a1c4",
"name": "https://github.com/netty/netty/commit/fe18adff1c2b333acb135ab779a3b9ba3295a1c4"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20230111 [SECURITY] [DLA 3268-1] netty security update",
"url": "https://lists.debian.org/debian-lts-announce/2023/01/msg00008.html"
}
]
},
"impact": {
"cvss": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
}
"cvss": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
}
}
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2023-0227",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}