Netty, an asynchronous, event-driven network application framework, has a vulnerability starting in version 4.1.91.Final and prior to version 4.1.118.Final. When a special crafted packet is received via SslHandler it doesn't correctly handle validation of such a packet in all cases which can lead to a native crash. Version 4.1.118.Final contains a patch. As workaround its possible to either disable the usage of the native SSLEngine or change the code manually.
References
Configurations
No configuration.
History
16 Apr 2025, 16:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
21 Feb 2025, 18:15
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
References |
|
11 Feb 2025, 16:15
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/netty/netty/security/advisories/GHSA-4g8c-wm8x-jfhw - |
10 Feb 2025, 22:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-02-10 22:15
Updated : 2025-04-16 16:15
NVD link : CVE-2025-24970
Mitre link : CVE-2025-24970
CVE.ORG link : CVE-2025-24970
JSON object : View
Products Affected
No product.
CWE
CWE-20
Improper Input Validation