First published: Mon Feb 10 2025(Updated: )
Netty, an asynchronous, event-driven network application framework, has a vulnerability starting in version 4.1.91.Final and prior to version 4.1.118.Final. When a special crafted packet is received via SslHandler it doesn't correctly handle validation of such a packet in all cases which can lead to a native crash. Version 4.1.118.Final contains a patch. As workaround its possible to either disable the usage of the native SSLEngine or change the code manually.
Affected Software | Affected Version | How to fix |
---|---|---|
NettyRPC | >=4.1.91.Final<4.1.118.Final |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-2344787 is classified as medium due to potential impact on application security.
To fix REDHAT-BUG-2344787, upgrade your Netty version to 4.1.118.Final or later.
Versions of Netty from 4.1.91.Final to prior to 4.1.118.Final are affected by REDHAT-BUG-2344787.
REDHAT-BUG-2344787 is a vulnerability related to improper handling of packets in the SslHandler component of Netty.
No, REDHAT-BUG-2344787 does not lead to remote code execution but can compromise application integrity.