{"id":"CVE-2026-42577","summary":"Netty: epoll transport denial of service via RST on half-closed TCP connection","details":"Netty is an asynchronous, event-driven network application framework. From 4.2.0.Final to 4.2.13.Final , Netty's epoll transport fails to detect and close TCP connections that receive a RST after being half-closed, leading to stale channels that are never cleaned up and, in some code paths, a 100% CPU busy-loop in the event loop thread. This vulnerability is fixed in 4.2.13.Final.","aliases":["GHSA-rwm7-x88c-3g2p"],"modified":"2026-05-20T03:52:53.424369398Z","published":"2026-05-13T18:00:28.744Z","related":["CGA-pcrm-jrq4-v7hw"],"database_specific":{"cwe_ids":["CWE-772"],"cna_assigner":"GitHub_M","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/42xxx/CVE-2026-42577.json"},"references":[{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/42xxx/CVE-2026-42577.json"},{"type":"ADVISORY","url":"https://github.com/netty/netty/security/advisories/GHSA-rwm7-x88c-3g2p"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-42577"},{"type":"FIX","url":"https://github.com/netty/netty/commit/0ec3d97fab376e243d328ac95fbd288ba0f6e22d"},{"type":"FIX","url":"https://github.com/netty/netty/pull/16689"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/netty/netty","events":[{"introduced":"09e64d259c99be8b5b2a471a78f11e65eb82598a"},{"fixed":"b3844c8108b42f68d56144b36d4d1ed96078a688"}]}],"versions":["netty-4.2.12.Final","netty-4.2.11.Final","netty-4.2.10.Final","netty-4.2.9.Final","netty-4.2.8.Final","netty-4.2.7.Final","netty-4.2.6.Final","netty-4.2.5.Final","netty-4.2.4.Final","netty-4.2.3.Final","netty-4.2.2.Final","netty-4.2.1.Final","netty-4.2.0.Final"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2026-42577.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}]}