CVE-2026-42577 PUBLISHED

Netty: epoll transport denial of service via RST on half-closed TCP connection

Assigner: GitHub_M
Reserved: 28.04.2026 Published: 13.05.2026 Updated: 13.05.2026

Netty is an asynchronous, event-driven network application framework. From 4.2.0.Final to 4.2.13.Final , Netty's epoll transport fails to detect and close TCP connections that receive a RST after being half-closed, leading to stale channels that are never cleaned up and, in some code paths, a 100% CPU busy-loop in the event loop thread. This vulnerability is fixed in 4.2.13.Final.

Metrics

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVSS Score: 7.5

Product Status

Vendor netty
Product netty
Versions
  • Version >= 4.2.0.Final, < 4.2.13.Final is affected

References

Problem Types

  • CWE-772: Missing Release of Resource after Effective Lifetime CWE