
We found results for “”
CVE-2025-58057
Good to know:

Date: September 3, 2025
Netty is an asynchronous event-driven network application framework for rapid development of maintainable high performance protocol servers & clients. In netty-codec-compression versions 4.2.4.Final and below, and netty-codec versions 4.1.124.Final and below, when supplied with specially crafted input, BrotliDecoder and certain other decompression decoders will allocate a large number of reachable byte buffers, which can lead to denial of service. BrotliDecoder.decompress has no limit in how often it calls pull, decompressing data 64K bytes at a time. The buffers are saved in the output list, and remain reachable until OOM is hit. This is fixed in versions 4.1.125.Final of netty-codec and 4.2.5.Final of netty-codec-compression.
Severity Score
Related Resources (6)
Severity Score
Weakness Type (CWE)
Improper Handling of Highly Compressed Data (Data Amplification)
CWE-409Top Fix

Upgrade Version
Upgrade to version io.netty:netty-codec-compression:4.2.5.Final;io.netty:netty-codec:4.1.125.Final;io.netty:netty-all:4.2.5.Final;io.netty:netty-all:4.1.125.Final;io.netty:netty-codec-http2:4.2.5.Final;io.netty:netty-codec-http2:4.1.125.Final;io.netty:netty-codec-http:4.2.5.Final;io.netty:netty-codec-http:4.1.125.Final;https://github.com/netty/netty.git - netty-4.2.5.Final;https://github.com/netty/netty.git - netty-4.1.125.Final
CVSS v3.1
Base Score: |
|
---|---|
Attack Vector (AV): | NETWORK |
Attack Complexity (AC): | LOW |
Privileges Required (PR): | NONE |
User Interaction (UI): | NONE |
Scope (S): | UNCHANGED |
Confidentiality (C): | NONE |
Integrity (I): | NONE |
Availability (A): | HIGH |