Bug 2344787 (CVE-2025-24970) - CVE-2025-24970 io.netty:netty-handler: SslHandler doesn't correctly validate packets which can lead to native crash when using native SSLEngine
Summary: CVE-2025-24970 io.netty:netty-handler: SslHandler doesn't correctly validate ...
Keywords:
Status: NEW
Alias: CVE-2025-24970
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
high
high
Target Milestone: ---
Assignee: Product Security DevOps Team
QA Contact:
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2025-02-10 23:01 UTC by OSIDB Bzimport
Modified: 2025-06-10 10:39 UTC (History)
123 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2025:1884 0 None None None 2025-02-27 15:15:12 UTC
Red Hat Product Errata RHSA-2025:1885 0 None None None 2025-02-27 13:16:25 UTC
Red Hat Product Errata RHSA-2025:2067 0 None None None 2025-03-03 13:23:29 UTC
Red Hat Product Errata RHSA-2025:2663 0 None None None 2025-03-11 14:10:27 UTC
Red Hat Product Errata RHSA-2025:3357 0 None None None 2025-03-27 16:40:30 UTC
Red Hat Product Errata RHSA-2025:3358 0 None None None 2025-03-27 16:47:15 UTC
Red Hat Product Errata RHSA-2025:3465 0 None None None 2025-04-01 13:10:10 UTC
Red Hat Product Errata RHSA-2025:3467 0 None None None 2025-04-01 13:07:00 UTC
Red Hat Product Errata RHSA-2025:3540 0 None None None 2025-04-02 16:43:44 UTC
Red Hat Product Errata RHSA-2025:3543 0 None None None 2025-04-02 20:19:31 UTC
Red Hat Product Errata RHSA-2025:4548 0 None None None 2025-05-06 14:30:39 UTC
Red Hat Product Errata RHSA-2025:4549 0 None None None 2025-05-06 14:31:05 UTC
Red Hat Product Errata RHSA-2025:4550 0 None None None 2025-05-06 14:30:01 UTC
Red Hat Product Errata RHSA-2025:4552 0 None None None 2025-05-06 14:28:16 UTC
Red Hat Product Errata RHSA-2025:8761 0 None None None 2025-06-10 10:39:58 UTC

Description OSIDB Bzimport 2025-02-10 23:01:15 UTC
Netty, an asynchronous, event-driven network application framework, has a vulnerability starting in version 4.1.91.Final and prior to version 4.1.118.Final. When a special crafted packet is received via SslHandler it doesn't correctly handle validation of such a packet in all cases which can lead to a native crash. Version 4.1.118.Final contains a patch. As workaround its possible to either disable the usage of the native SSLEngine or change the code manually.

Comment 3 errata-xmlrpc 2025-02-27 13:16:21 UTC
This issue has been addressed in the following products:

  Red Hat build of Quarkus 3.15.3.SP1

Via RHSA-2025:1885 https://access.redhat.com/errata/RHSA-2025:1885

Comment 4 errata-xmlrpc 2025-02-27 15:15:08 UTC
This issue has been addressed in the following products:

  Red Hat build of Quarkus 3.8.6.SP3

Via RHSA-2025:1884 https://access.redhat.com/errata/RHSA-2025:1884

Comment 5 errata-xmlrpc 2025-03-03 13:23:23 UTC
This issue has been addressed in the following products:

  Red Hat Build of Apache Camel 4.8 for Quarkus 3.15

Via RHSA-2025:2067 https://access.redhat.com/errata/RHSA-2025:2067

Comment 7 errata-xmlrpc 2025-03-11 14:10:20 UTC
This issue has been addressed in the following products:

  Red Hat Data Grid

Via RHSA-2025:2663 https://access.redhat.com/errata/RHSA-2025:2663

Comment 9 errata-xmlrpc 2025-03-27 16:40:25 UTC
This issue has been addressed in the following products:

  Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 9
  Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 8

Via RHSA-2025:3357 https://access.redhat.com/errata/RHSA-2025:3357

Comment 10 errata-xmlrpc 2025-03-27 16:47:09 UTC
This issue has been addressed in the following products:

  Red Hat JBoss Enterprise Application Platform

Via RHSA-2025:3358 https://access.redhat.com/errata/RHSA-2025:3358

Comment 11 errata-xmlrpc 2025-04-01 13:06:53 UTC
This issue has been addressed in the following products:

  Red Hat JBoss Enterprise Application Platform

Via RHSA-2025:3467 https://access.redhat.com/errata/RHSA-2025:3467

Comment 12 errata-xmlrpc 2025-04-01 13:10:04 UTC
This issue has been addressed in the following products:

  Red Hat JBoss Enterprise Application Platform 7.4 on RHEL 7
  Red Hat JBoss Enterprise Application Platform 7.4 for RHEL 8
  Red Hat JBoss Enterprise Application Platform 7.4 for RHEL 9

Via RHSA-2025:3465 https://access.redhat.com/errata/RHSA-2025:3465

Comment 13 errata-xmlrpc 2025-04-02 16:43:38 UTC
This issue has been addressed in the following products:

  RHINT Camel-K 1.10.10

Via RHSA-2025:3540 https://access.redhat.com/errata/RHSA-2025:3540

Comment 14 errata-xmlrpc 2025-04-02 20:19:25 UTC
This issue has been addressed in the following products:

  Red Hat build of Apache Camel 4.8.5 for Spring Boot

Via RHSA-2025:3543 https://access.redhat.com/errata/RHSA-2025:3543

Comment 16 errata-xmlrpc 2025-05-06 14:28:07 UTC
This issue has been addressed in the following products:

  Red Hat JBoss Enterprise Application Platform

Via RHSA-2025:4552 https://access.redhat.com/errata/RHSA-2025:4552

Comment 17 errata-xmlrpc 2025-05-06 14:29:52 UTC
This issue has been addressed in the following products:

  Red Hat JBoss Enterprise Application Platform 7.4 for RHEL 9

Via RHSA-2025:4550 https://access.redhat.com/errata/RHSA-2025:4550

Comment 18 errata-xmlrpc 2025-05-06 14:30:32 UTC
This issue has been addressed in the following products:

  Red Hat JBoss Enterprise Application Platform 7.4 on RHEL 7

Via RHSA-2025:4548 https://access.redhat.com/errata/RHSA-2025:4548

Comment 19 errata-xmlrpc 2025-05-06 14:30:56 UTC
This issue has been addressed in the following products:

  Red Hat JBoss Enterprise Application Platform 7.4 for RHEL 8

Via RHSA-2025:4549 https://access.redhat.com/errata/RHSA-2025:4549

Comment 20 errata-xmlrpc 2025-06-10 10:39:49 UTC
This issue has been addressed in the following products:

  HawtIO HawtIO 4.2.0

Via RHSA-2025:8761 https://access.redhat.com/errata/RHSA-2025:8761


Note You need to log in before you can comment on or make changes to this bug.