Netty is an asynchronous, event-driven network application framework. From 4.2.0.Final to 4.2.13.Final , Netty's epoll transport fails to detect and close TCP connections that receive a RST after being half-closed, leading to stale channels that are never cleaned up and, in some code paths, a 100% CPU busy-loop in the event loop thread. This vulnerability is fixed in 4.2.13.Final.

Project Subscriptions

No data.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-rwm7-x88c-3g2p Netty epoll transport denial of service via RST on half-closed TCP connection
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 13 May 2026 18:30:00 +0000

Type Values Removed Values Added
Description Netty is an asynchronous, event-driven network application framework. From 4.2.0.Final to 4.2.13.Final , Netty's epoll transport fails to detect and close TCP connections that receive a RST after being half-closed, leading to stale channels that are never cleaned up and, in some code paths, a 100% CPU busy-loop in the event loop thread. This vulnerability is fixed in 4.2.13.Final.
Title Netty: epoll transport denial of service via RST on half-closed TCP connection
Weaknesses CWE-772
References
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-05-13T18:00:28.744Z

Reserved: 2026-04-28T17:26:12.085Z

Link: CVE-2026-42577

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-13T19:17:23.063

Modified: 2026-05-13T19:17:23.063

Link: CVE-2026-42577

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-13T19:45:03Z

Weaknesses