Improper Handling of Highly Compressed Data (Data Amplification) in io.netty:netty
CVE-2025-58057
- io.netty:netty
- io.netty:netty-all
- io.netty:netty-codec
- io.netty:netty-codec-compression
- io.netty:netty-codec-http2
- io.netty:netty-codec-http
- io.netty:netty5-codec-http2
- io.netty:netty5-codec-http
Summary
Netty is an asynchronous event-driven network application framework for rapid development of maintainable high performance protocol servers & clients. In affected versions, when supplied with specially crafted input, `BrotliDecoder` and certain other decompression decoders will allocate a large number of reachable byte buffers, which can lead to denial of service. `BrotliDecoder.decompress` has no limit in how often it calls `pull`, decompressing data 64K bytes at a time. The buffers are saved in the output list, and remain reachable until OOM is hit. This issue affects versions through 4.1.124.Final, 4.2.0.Alpha1 through 4.2.4.Final and 5.0.0.Alpha1 and 5.0.0.Alpha5.
- LOW
- NETWORK
- NONE
- UNCHANGED
- NONE
- NONE
- NONE
- HIGH
CWE-409 - Improper Handling of Highly Compressed Data (Data Amplification)
The software does not handle or incorrectly handles a compressed input with a very high compression ratio that produces a large output.
References
Advisory Timeline
- Published