Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2025-58057

Опубликовано: 03 сент. 2025
Источник: redhat
CVSS3: 7.5
EPSS Низкий

Описание

Netty is an asynchronous event-driven network application framework for rapid development of maintainable high performance protocol servers & clients. In netty-codec-compression versions 4.1.124.Final and below, and netty-codec versions 4.2.4.Final and below, when supplied with specially crafted input, BrotliDecoder and certain other decompression decoders will allocate a large number of reachable byte buffers, which can lead to denial of service. BrotliDecoder.decompress has no limit in how often it calls pull, decompressing data 64K bytes at a time. The buffers are saved in the output list, and remain reachable until OOM is hit. This is fixed in versions 4.1.125.Final of netty-codec and 4.2.5.Final of netty-codec-compression.

A flaw was found in Netty. With specially crafted input, BrotliDecoder and some other decompressing decoders will allocate a large number of reachable byte buffers, which can lead to denial of service.

Отчет

This vulnerability is rated Moderate for Red Hat products. A flaw in Netty's BrotliDecoder and other decompression decoders can lead to a denial of service when processing specially crafted input. This affects various Red Hat products that utilize Netty for network communication and data decompression. Using BrotliDecoder on untrusted input is entirely

Меры по смягчению последствий

Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Cryostat 4netty-codecNot affected
Logging Subsystem for Red Hat OpenShiftnetty-codecNot affected
OpenShift Serverlessopenshift-serverless-1/kn-ekb-dispatcher-rhel8Not affected
OpenShift Serverlessopenshift-serverless-1/kn-ekb-kafka-controller-rhel8Not affected
OpenShift Serverlessopenshift-serverless-1/kn-ekb-post-install-rhel8Not affected
OpenShift Serverlessopenshift-serverless-1/kn-ekb-receiver-rhel8Not affected
OpenShift Serverlessopenshift-serverless-1/kn-ekb-webhook-kafka-rhel8Not affected
OpenShift Serverlessopenshift-serverless-1/kn-eventing-integrations-aws-ddb-streams-source-rhel8Not affected
OpenShift Serverlessopenshift-serverless-1/kn-eventing-integrations-aws-s3-sink-rhel8Not affected
OpenShift Serverlessopenshift-serverless-1/kn-eventing-integrations-aws-s3-source-rhel8Not affected

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-409
https://bugzilla.redhat.com/show_bug.cgi?id=2393000netty-codec: netty-codec-compression: Netty's BrotliDecoder is vulnerable to DoS via zip bomb style attack

EPSS

Процентиль: 17%
0.00053
Низкий

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 7.5
ubuntu
7 месяцев назад

Netty is an asynchronous event-driven network application framework for rapid development of maintainable high performance protocol servers & clients. In netty-codec-compression versions 4.1.124.Final and below, and netty-codec versions 4.2.4.Final and below, when supplied with specially crafted input, BrotliDecoder and certain other decompression decoders will allocate a large number of reachable byte buffers, which can lead to denial of service. BrotliDecoder.decompress has no limit in how often it calls pull, decompressing data 64K bytes at a time. The buffers are saved in the output list, and remain reachable until OOM is hit. This is fixed in versions 4.1.125.Final of netty-codec and 4.2.5.Final of netty-codec-compression.

CVSS3: 7.5
nvd
7 месяцев назад

Netty is an asynchronous event-driven network application framework for rapid development of maintainable high performance protocol servers & clients. In netty-codec-compression versions 4.1.124.Final and below, and netty-codec versions 4.2.4.Final and below, when supplied with specially crafted input, BrotliDecoder and certain other decompression decoders will allocate a large number of reachable byte buffers, which can lead to denial of service. BrotliDecoder.decompress has no limit in how often it calls pull, decompressing data 64K bytes at a time. The buffers are saved in the output list, and remain reachable until OOM is hit. This is fixed in versions 4.1.125.Final of netty-codec and 4.2.5.Final of netty-codec-compression.

CVSS3: 7.5
debian
7 месяцев назад

Netty is an asynchronous event-driven network application framework fo ...

github
7 месяцев назад

Netty's decoders vulnerable to DoS via zip bomb style attack

CVSS3: 7.5
fstec
7 месяцев назад

Уязвимость сетевого программного средства Netty, связанная с неконтролируемым расходом ресурсов, позволяющая нарушителю вызвать отказ в обслуживании

EPSS

Процентиль: 17%
0.00053
Низкий

7.5 High

CVSS3