CVE-2025-25193 (Medium) detected in netty-common-4.1.76.Final.jar, netty-common-4.1.67.Final.jar #434
Labels
Mend: dependency security vulnerability
Security vulnerability detected by WhiteSource
CVE-2025-25193 - Medium Severity Vulnerability
netty-common-4.1.76.Final.jar
Library home page: https://netty.io/
Path to dependency file: /openapi-client/java-micronaut-client/pom.xml
Path to vulnerable library: /openapi-client/java-micronaut-client/pom.xml
Dependency Hierarchy:
netty-common-4.1.67.Final.jar
Library home page: https://netty.io/
Path to dependency file: /swagger-client/micronaut/pom.xml
Path to vulnerable library: /swagger-client/micronaut/pom.xml
Dependency Hierarchy:
Found in HEAD commit: 0879348474e22463e77dc76ba5e5f7e6300a2b6c
Found in base branch: master
Netty, an asynchronous, event-driven network application framework, has a vulnerability in versions up to and including 4.1.118.Final. An unsafe reading of environment file could potentially cause a denial of service in Netty. When loaded on an Windows application, Netty attempts to load a file that does not exist. If an attacker creates such a large file, the Netty application crash. A similar issue was previously reported as CVE-2024-47535. This issue was fixed, but the fix was incomplete in that null-bytes were not counted against the input limit. Commit d1fbda62d3a47835d3fb35db8bd42ecc205a5386 contains an updated fix.
Publish Date: 2025-02-10
URL: CVE-2025-25193
Base Score Metrics:
Type: Upgrade version
Origin: GHSA-389x-839f-4rhx
Release Date: 2025-02-10
Fix Resolution (io.netty:netty-common): 4.1.118.Final
Direct dependency fix Resolution (io.micronaut:micronaut-http-client): 4.7.14
Fix Resolution (io.netty:netty-common): 4.1.118.Final
Direct dependency fix Resolution (io.micronaut:micronaut-http-client): 4.7.14
Step up your Open Source Security Game with Mend here
The text was updated successfully, but these errors were encountered: