CVE-2025-58057

Publication date 4 September 2025

Last updated 10 December 2025


Ubuntu priority

Description

Netty is an asynchronous event-driven network application framework for rapid development of maintainable high performance protocol servers & clients. In netty-codec-compression versions 4.1.124.Final and below, and netty-codec versions 4.2.4.Final and below, when supplied with specially crafted input, BrotliDecoder and certain other decompression decoders will allocate a large number of reachable byte buffers, which can lead to denial of service. BrotliDecoder.decompress has no limit in how often it calls pull, decompressing data 64K bytes at a time. The buffers are saved in the output list, and remain reachable until OOM is hit. This is fixed in versions 4.1.125.Final of netty-codec and 4.2.5.Final of netty-codec-compression.

Status

Package Ubuntu Release Status
netty 25.10 questing
Fixed 1:4.1.48-10ubuntu0.25.10.2
25.04 plucky
Fixed 1:4.1.48-10ubuntu0.25.04.2
24.04 LTS noble
Fixed 1:4.1.48-9ubuntu0.1
22.04 LTS jammy
Fixed 1:4.1.48-4+deb11u2ubuntu0.1
20.04 LTS focal
Fixed 1:4.1.45-1ubuntu0.1~esm4
18.04 LTS bionic
Fixed 1:4.1.7-4ubuntu0.1+esm5
16.04 LTS xenial Ignored end of ESM support, was ignored [backport too intrusive]
14.04 LTS trusty Ignored backport too intrusive

Get expanded security coverage with Ubuntu Pro

Reduce your average CVE exposure time from 98 days to 1 day with expanded CVE patching, ten-years security maintenance and optional support for the full stack of open-source applications. Free for personal use.

Get Ubuntu Pro 30-day free trial

Patch details

For informational purposes only. We recommend not to cherry-pick updates. How can I get the fixes?

Package Patch details
netty

Access our resources on patching vulnerabilities