Bug 2344787 (CVE-2025-24970)

Summary: CVE-2025-24970 io.netty:netty-handler: SslHandler doesn't correctly validate packets which can lead to native crash when using native SSLEngine
Product: [Other] Security Response Reporter: OSIDB Bzimport <bzimport>
Component: vulnerabilityAssignee: Product Security DevOps Team <prodsec-dev>
Status: NEW --- QA Contact:
Severity: high Docs Contact:
Priority: high    
Version: unspecifiedCC: aazores, abrianik, adupliak, anstephe, aprice, aschwart, asoldano, ataylor, avibelli, bbaranow, bgeorges, bihu, bmaxwell, boliveir, brian.stansberry, caswilli, ccranfor, cdewolf, chazlett, chfoley, clement.escoffier, cmah, cmiranda, dandread, darran.lofthouse, dbruscin, dhanak, dkreling, dnakabaa, dosoudil, drichtar, drosa, dsimansk, eaguilar, ebaron, ecerquei, eric.wittmann, fjuma, fmariani, fmongiar, ggrzybek, gmalinko, gsmet, ibek, istudens, ivassile, iweiss, janstey, jcantril, jcechace, jkoops, jmartisk, jnethert, jolong, jpechane, jpoth, jrokos, jross, jsamir, jscholz, kaycoth, kgaikwad, kholdawa, kingland, kvanderr, kverlaen, lcouzens, lgao, lthon, manderse, matzew, mnovotny, mosmerov, mpierce, mposolda, mskarbek, msochure, msvehla, nipatil, nwallace, oezr, olubyans, pantinor, parichar, pbizzarr, pcongius, pdelbell, pdrozd, peholase, pesilva, pgallagh, pierdipi, pjindal, pmackay, probinso, pskopek, rguimara, rhuss, rkieley, rkubis, rmartinc, rojacob, rowaters, rruss, rstancel, rstepani, rsvoboda, sausingh, sbiarozk, sfroberg, smaestri, ssilvert, sthirugn, sthorger, swoodman, tasato, tcunning, tom.jenkinson, tqvarnst, vkrizan, vmuzikar, wfink, yfang
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: If docs needed, set a value
Doc Text:
A flaw was found in Netty's SslHandler. This vulnerability allows a native crash via a specially crafted packet that bypasses proper validation.
Story Points: ---
Clone Of: Environment:
Last Closed: Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:

Description OSIDB Bzimport 2025-02-10 23:01:15 UTC
Netty, an asynchronous, event-driven network application framework, has a vulnerability starting in version 4.1.91.Final and prior to version 4.1.118.Final. When a special crafted packet is received via SslHandler it doesn't correctly handle validation of such a packet in all cases which can lead to a native crash. Version 4.1.118.Final contains a patch. As workaround its possible to either disable the usage of the native SSLEngine or change the code manually.

Comment 3 errata-xmlrpc 2025-02-27 13:16:21 UTC
This issue has been addressed in the following products:

  Red Hat build of Quarkus 3.15.3.SP1

Via RHSA-2025:1885 https://access.redhat.com/errata/RHSA-2025:1885

Comment 4 errata-xmlrpc 2025-02-27 15:15:08 UTC
This issue has been addressed in the following products:

  Red Hat build of Quarkus 3.8.6.SP3

Via RHSA-2025:1884 https://access.redhat.com/errata/RHSA-2025:1884

Comment 5 errata-xmlrpc 2025-03-03 13:23:23 UTC
This issue has been addressed in the following products:

  Red Hat Build of Apache Camel 4.8 for Quarkus 3.15

Via RHSA-2025:2067 https://access.redhat.com/errata/RHSA-2025:2067

Comment 7 errata-xmlrpc 2025-03-11 14:10:20 UTC
This issue has been addressed in the following products:

  Red Hat Data Grid

Via RHSA-2025:2663 https://access.redhat.com/errata/RHSA-2025:2663

Comment 9 errata-xmlrpc 2025-03-27 16:40:25 UTC
This issue has been addressed in the following products:

  Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 9
  Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 8

Via RHSA-2025:3357 https://access.redhat.com/errata/RHSA-2025:3357

Comment 10 errata-xmlrpc 2025-03-27 16:47:09 UTC
This issue has been addressed in the following products:

  Red Hat JBoss Enterprise Application Platform

Via RHSA-2025:3358 https://access.redhat.com/errata/RHSA-2025:3358

Comment 11 errata-xmlrpc 2025-04-01 13:06:53 UTC
This issue has been addressed in the following products:

  Red Hat JBoss Enterprise Application Platform

Via RHSA-2025:3467 https://access.redhat.com/errata/RHSA-2025:3467

Comment 12 errata-xmlrpc 2025-04-01 13:10:04 UTC
This issue has been addressed in the following products:

  Red Hat JBoss Enterprise Application Platform 7.4 on RHEL 7
  Red Hat JBoss Enterprise Application Platform 7.4 for RHEL 8
  Red Hat JBoss Enterprise Application Platform 7.4 for RHEL 9

Via RHSA-2025:3465 https://access.redhat.com/errata/RHSA-2025:3465

Comment 13 errata-xmlrpc 2025-04-02 16:43:38 UTC
This issue has been addressed in the following products:

  RHINT Camel-K 1.10.10

Via RHSA-2025:3540 https://access.redhat.com/errata/RHSA-2025:3540

Comment 14 errata-xmlrpc 2025-04-02 20:19:25 UTC
This issue has been addressed in the following products:

  Red Hat build of Apache Camel 4.8.5 for Spring Boot

Via RHSA-2025:3543 https://access.redhat.com/errata/RHSA-2025:3543

Comment 16 errata-xmlrpc 2025-05-06 14:28:07 UTC
This issue has been addressed in the following products:

  Red Hat JBoss Enterprise Application Platform

Via RHSA-2025:4552 https://access.redhat.com/errata/RHSA-2025:4552

Comment 17 errata-xmlrpc 2025-05-06 14:29:52 UTC
This issue has been addressed in the following products:

  Red Hat JBoss Enterprise Application Platform 7.4 for RHEL 9

Via RHSA-2025:4550 https://access.redhat.com/errata/RHSA-2025:4550

Comment 18 errata-xmlrpc 2025-05-06 14:30:32 UTC
This issue has been addressed in the following products:

  Red Hat JBoss Enterprise Application Platform 7.4 on RHEL 7

Via RHSA-2025:4548 https://access.redhat.com/errata/RHSA-2025:4548

Comment 19 errata-xmlrpc 2025-05-06 14:30:56 UTC
This issue has been addressed in the following products:

  Red Hat JBoss Enterprise Application Platform 7.4 for RHEL 8

Via RHSA-2025:4549 https://access.redhat.com/errata/RHSA-2025:4549

Comment 20 errata-xmlrpc 2025-06-10 10:39:49 UTC
This issue has been addressed in the following products:

  HawtIO HawtIO 4.2.0

Via RHSA-2025:8761 https://access.redhat.com/errata/RHSA-2025:8761