Vulnerability Description
Netty is an asynchronous, event-driven network application framework. From 4.2.0.Final to 4.2.13.Final , Netty's epoll transport fails to detect and close TCP connections that receive a RST after being half-closed, leading to stale channels that are never cleaned up and, in some code paths, a 100% CPU busy-loop in the event loop thread. This vulnerability is fixed in 4.2.13.Final.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Netty | Netty | >= 4.2.0, < 4.2.13 |
Related Weaknesses (CWE)
References
- https://github.com/netty/netty/commit/0ec3d97fab376e243d328ac95fbd288ba0f6e22dPatch
- https://github.com/netty/netty/pull/16689Issue TrackingPatch
- https://github.com/netty/netty/security/advisories/GHSA-rwm7-x88c-3g2pMitigationVendor Advisory
FAQ
What is CVE-2026-42577?
CVE-2026-42577 is a vulnerability with a CVSS score of 7.5 (HIGH). Netty is an asynchronous, event-driven network application framework. From 4.2.0.Final to 4.2.13.Final , Netty's epoll transport fails to detect and close TCP connections that receive a RST after bein...
How severe is CVE-2026-42577?
CVE-2026-42577 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-42577?
Check the references section above for vendor advisories and patch information. Affected products include: Netty Netty.