Skip to main content

Improper Handling of Highly Compressed Data (Data Amplification) in io.netty:netty

CVE-2025-58057

  • io.netty:netty
  • io.netty:netty-all
  • io.netty:netty-codec
  • io.netty:netty-codec-compression
  • io.netty:netty-codec-http2
  • io.netty:netty-codec-http
  • io.netty:netty5-codec-http2
  • io.netty:netty5-codec-http
Severity Medium
Score 6.9/10

Summary

Netty is an asynchronous event-driven network application framework for rapid development of maintainable high performance protocol servers & clients. In affected versions, when supplied with specially crafted input, `BrotliDecoder` and certain other decompression decoders will allocate a large number of reachable byte buffers, which can lead to denial of service. `BrotliDecoder.decompress` has no limit in how often it calls `pull`, decompressing data 64K bytes at a time. The buffers are saved in the output list, and remain reachable until OOM is hit. This issue affects versions through 4.1.124.Final, 4.2.0.Alpha1 through 4.2.4.Final and 5.0.0.Alpha1 and 5.0.0.Alpha5.

  • LOW
  • NETWORK
  • NONE
  • UNCHANGED
  • NONE
  • NONE
  • NONE
  • HIGH

CWE-409 - Improper Handling of Highly Compressed Data (Data Amplification)

The software does not handle or incorrectly handles a compressed input with a very high compression ratio that produces a large output.

References

Advisory Timeline

  • Published