Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-cm33-6792-r9fm | Netty has a DNS Codec Input Validation Bypass (Encoder + Decoder) |
Wed, 13 May 2026 20:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Netty
Netty netty |
|
| Vendors & Products |
Netty
Netty netty |
Wed, 13 May 2026 18:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Netty is an asynchronous, event-driven network application framework. Prior to 4.2.13.Final and 4.1.133.Final, Netty's DNS codec does not enforce RFC 1035 domain name constraints during either encoding or decoding. This creates a bidirectional attack surface: malicious DNS responses can exploit the decoder, and user-influenced hostnames can exploit the encoder. This vulnerability is fixed in 4.2.13.Final and 4.1.133.Final. | |
| Title | Netty: DNS Codec Input Validation Bypass in Netty (Encoder + Decoder) | |
| Weaknesses | CWE-20 CWE-400 CWE-626 |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-05-13T18:01:52.500Z
Reserved: 2026-04-28T17:26:12.085Z
Link: CVE-2026-42579
No data.
Status : Awaiting Analysis
Published: 2026-05-13T19:17:23.353
Modified: 2026-05-14T16:26:50.047
Link: CVE-2026-42579
No data.
OpenCVE Enrichment
Updated: 2026-05-13T19:45:03Z
Github GHSA