Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-rwm7-x88c-3g2p | Netty epoll transport denial of service via RST on half-closed TCP connection |
Thu, 14 May 2026 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 13 May 2026 22:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Netty
Netty netty |
|
| Vendors & Products |
Netty
Netty netty |
Wed, 13 May 2026 18:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Netty is an asynchronous, event-driven network application framework. From 4.2.0.Final to 4.2.13.Final , Netty's epoll transport fails to detect and close TCP connections that receive a RST after being half-closed, leading to stale channels that are never cleaned up and, in some code paths, a 100% CPU busy-loop in the event loop thread. This vulnerability is fixed in 4.2.13.Final. | |
| Title | Netty: epoll transport denial of service via RST on half-closed TCP connection | |
| Weaknesses | CWE-772 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-05-14T15:39:44.314Z
Reserved: 2026-04-28T17:26:12.085Z
Link: CVE-2026-42577
Updated: 2026-05-14T15:39:40.715Z
Status : Awaiting Analysis
Published: 2026-05-13T19:17:23.063
Modified: 2026-05-14T16:26:50.047
Link: CVE-2026-42577
No data.
OpenCVE Enrichment
Updated: 2026-05-13T21:45:04Z
Github GHSA