Netty is an asynchronous, event-driven network application framework. Prior to versions 4.1.124.Final and 4.2.4.Final, Netty is vulnerable to MadeYouReset DDoS. This is a logical vulnerability in the HTTP/2 protocol, that uses malformed HTTP/2 control frames in order to break the max concurrent streams limit - which results in resource exhaustion and distributed denial of service. This issue has been patched in versions 4.1.124.Final and 4.2.4.Final.
This issue has been addressed in the following products: Red Hat Build of Apache Camel 4.10 for Quarkus 3.20 Via RHSA-2025:14197 https://access.redhat.com/errata/RHSA-2025:14197
This issue has been addressed in the following products: Red Hat build of Apache Camel 4.10.6 for Spring Boot 3.4.9 Via RHSA-2025:14911 https://access.redhat.com/errata/RHSA-2025:14911
This issue has been addressed in the following products: Cryostat 4 on RHEL 9 Via RHSA-2025:14919 https://access.redhat.com/errata/RHSA-2025:14919
This issue has been addressed in the following products: Streams for Apache Kafka 2.9.2 Via RHSA-2025:15697 https://access.redhat.com/errata/RHSA-2025:15697
This issue has been addressed in the following products: Streams for Apache Kafka 3.0.1 Via RHSA-2025:16407 https://access.redhat.com/errata/RHSA-2025:16407
This issue has been addressed in the following products: Red Hat JBoss Enterprise Application Platform 8.1.0 Via RHSA-2025:17299 https://access.redhat.com/errata/RHSA-2025:17299
This issue has been addressed in the following products: Red Hat JBoss Enterprise Application Platform 8.1 for RHEL 9 Red Hat JBoss Enterprise Application Platform 8.1 for RHEL 8 Via RHSA-2025:17298 https://access.redhat.com/errata/RHSA-2025:17298
This issue has been addressed in the following products: Red Hat JBoss Enterprise Application Platform 8.0.9 Via RHSA-2025:17318 https://access.redhat.com/errata/RHSA-2025:17318
This issue has been addressed in the following products: Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 9 Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 8 Via RHSA-2025:17317 https://access.redhat.com/errata/RHSA-2025:17317