Description
Netty project is an event-driven asynchronous network application framework. In versions prior to 4.1.86.Final, a StackOverflowError can be raised when parsing a malformed crafted message due to an infinite recursion. This issue is patched in version 4.1.86.Final. There is no workaround, except using a custom HaProxyMessageDecoder.
Remediation
References
https://github.com/netty/netty/security/advisories/GHSA-fx2c-96vj-985v
https://lists.debian.org/debian-lts-announce/2023/01/msg00008.html
https://security.netapp.com/advisory/ntap-20230113-0004/
https://www.debian.org/security/2023/dsa-5316
Related Vulnerabilities
CVE-2020-12265 Vulnerability in maven package org.webjars:decompress
CVE-2022-36885 Vulnerability in maven package com.coravy.hudson.plugins.github:github
CVE-2023-28155 Vulnerability in maven package org.webjars.npm:request
CVE-2023-25826 Vulnerability in maven package net.opentsdb:opentsdb
CVE-2020-36048 Vulnerability in maven package org.webjars.bower:engine.io