Network Application Framework Vulnerability in Netty by The Netty Company
CVE-2026-42584
What is CVE-2026-42584?
The vulnerability in Netty's HttpClientCodec allows for improper pairing of inbound responses with outbound requests due to the queue.poll() mechanism. This issue arises particularly in scenarios where 1xx responses are involved, leading to unintended behavior in HTTP response processing. If a client requests both a GET and HEAD but the server first sends a 103 followed by two 200 responses, the HEAD request incorrectly reads the GET response's data, causing parsing errors. Proper handling is essential to ensure that application responses are processed correctly, and this issue is resolved in versions 4.2.13.Final and 4.1.133.Final.
Affected Version(s)
netty >= 4.2.0.Alpha1, < 4.2.13.Final < 4.2.0.Alpha1, 4.2.13.Final
netty < 4.1.133.Final < 4.1.133.Final
netty-codec-http >= 4.2.0.Alpha1, < 4.2.13.Final < 4.2.0.Alpha1, 4.2.13.Final
