Memory Management Issues in Netty Framework Affecting Multiple Encoding Types
CVE-2026-42587

7.5HIGH

Key Information:

Vendor

Netty

Vendor
CVE Published:
13 May 2026

What is CVE-2026-42587?

Netty, an event-driven network application framework, has a vulnerability related to the handling of the maxAllocation parameter in its HttpContentDecompressor component. The configured limits for decompression buffers can be ignored for certain compression types (Brotli, zstd, snappy). This oversight allows attackers to exploit the system by sending specially crafted compressed data, leading to unbounded memory allocation. This can result in denial of service through out-of-memory errors, impacting application availability. The issue has been addressed in versions 4.2.13.Final and 4.1.133.Final.

Affected Version(s)

netty >= 4.2.0.Alpha1, < 4.2.13.Final < 4.2.0.Alpha1, 4.2.13.Final

netty < 4.1.133.Final < 4.1.133.Final

netty-codec-http >= 4.2.0.Alpha1, < 4.2.13.Final < 4.2.0.Alpha1, 4.2.13.Final

References

CVSS V3.1

Score:
7.5
Severity:
HIGH
Confidentiality:
None
Integrity:
None
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.