Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2025-58057

Опубликовано: 03 сент. 2025
Источник: redhat
CVSS3: 5.3
EPSS Низкий

Описание

Netty is an asynchronous event-driven network application framework for rapid development of maintainable high performance protocol servers & clients. In netty-codec-compression versions 4.1.124.Final and below, and netty-codec versions 4.2.4.Final and below, when supplied with specially crafted input, BrotliDecoder and certain other decompression decoders will allocate a large number of reachable byte buffers, which can lead to denial of service. BrotliDecoder.decompress has no limit in how often it calls pull, decompressing data 64K bytes at a time. The buffers are saved in the output list, and remain reachable until OOM is hit. This is fixed in versions 4.1.125.Final of netty-codec and 4.2.5.Final of netty-codec-compression.

Меры по смягчению последствий

Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
AMQ Clientsnetty-codecFix deferred
Cryostat 4netty-codecFix deferred
Logging Subsystem for Red Hat OpenShiftnetty-codecFix deferred
OpenShift Serverlessopenshift-serverless-1/kn-ekb-dispatcher-rhel8Fix deferred
OpenShift Serverlessopenshift-serverless-1/kn-ekb-kafka-controller-rhel8Fix deferred
OpenShift Serverlessopenshift-serverless-1/kn-ekb-post-install-rhel8Fix deferred
OpenShift Serverlessopenshift-serverless-1/kn-ekb-receiver-rhel8Fix deferred
OpenShift Serverlessopenshift-serverless-1/kn-ekb-webhook-kafka-rhel8Fix deferred
OpenShift Serverlessopenshift-serverless-1/kn-eventing-integrations-aws-ddb-streams-source-rhel8Fix deferred
OpenShift Serverlessopenshift-serverless-1/kn-eventing-integrations-aws-s3-sink-rhel8Fix deferred

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-409
https://bugzilla.redhat.com/show_bug.cgi?id=2393000netty-codec: netty-codec-compression: Netty's BrotliDecoder is vulnerable to DoS via zip bomb style attack

EPSS

Процентиль: 3%
0.00018
Низкий

5.3 Medium

CVSS3

Связанные уязвимости

CVSS3: 7.5
ubuntu
около 1 месяца назад

Netty is an asynchronous event-driven network application framework for rapid development of maintainable high performance protocol servers & clients. In netty-codec-compression versions 4.1.124.Final and below, and netty-codec versions 4.2.4.Final and below, when supplied with specially crafted input, BrotliDecoder and certain other decompression decoders will allocate a large number of reachable byte buffers, which can lead to denial of service. BrotliDecoder.decompress has no limit in how often it calls pull, decompressing data 64K bytes at a time. The buffers are saved in the output list, and remain reachable until OOM is hit. This is fixed in versions 4.1.125.Final of netty-codec and 4.2.5.Final of netty-codec-compression.

CVSS3: 7.5
nvd
около 1 месяца назад

Netty is an asynchronous event-driven network application framework for rapid development of maintainable high performance protocol servers & clients. In netty-codec-compression versions 4.1.124.Final and below, and netty-codec versions 4.2.4.Final and below, when supplied with specially crafted input, BrotliDecoder and certain other decompression decoders will allocate a large number of reachable byte buffers, which can lead to denial of service. BrotliDecoder.decompress has no limit in how often it calls pull, decompressing data 64K bytes at a time. The buffers are saved in the output list, and remain reachable until OOM is hit. This is fixed in versions 4.1.125.Final of netty-codec and 4.2.5.Final of netty-codec-compression.

CVSS3: 7.5
debian
около 1 месяца назад

Netty is an asynchronous event-driven network application framework fo ...

github
около 1 месяца назад

Netty's decoders vulnerable to DoS via zip bomb style attack

CVSS3: 7.5
fstec
около 1 месяца назад

Уязвимость сетевого программного средства Netty, связанная с неконтролируемым расходом ресурсов, позволяющая нарушителю вызвать отказ в обслуживании

EPSS

Процентиль: 3%
0.00018
Низкий

5.3 Medium

CVSS3

Уязвимость CVE-2025-58057