OESA-2025-2526

Source
https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-2526
Import Source
https://repo.openeuler.org/security/data/osv/OESA-2025-2526.json
JSON Data
https://api.test.osv.dev/v1/vulns/OESA-2025-2526
Upstream
Published
2025-10-24T14:33:31Z
Modified
2025-10-24T15:04:14.161165Z
Summary
netty security update
Details

Netty is an asynchronous event-driven network application framework for rapid development of maintainable high performance protocol servers & clients. %package help Summary: Documents for Buildarch: noarch Requires: man info Provides: -javadoc = - Obsoletes: -javadoc < - %description help Man pages and other related documents for .

Security Fix(es):

Netty is an asynchronous, event-driven network application framework. In versions prior to 4.1.128.Final and 4.2.7.Final, the SMTP codec in Netty contains an SMTP command injection vulnerability due to insufficient input validation for Carriage Return (\r) and Line Feed (\n) characters in user-supplied parameters. The vulnerability exists in io.netty.handler.codec.smtp.DefaultSmtpRequest, where parameters are directly concatenated into the SMTP command string without sanitization. When methods such as SmtpRequests.rcpt(recipient) are called with a malicious string containing CRLF sequences, attackers can inject arbitrary SMTP commands. Because the injected commands are sent from the server's trusted IP address, resulting emails will likely pass SPF and DKIM authentication checks, making them appear legitimate. This allows remote attackers who can control SMTP command parameters (such as email recipients) to forge arbitrary emails from the trusted server, potentially impersonating executives and forging high-stakes corporate communications. This issue has been patched in versions 4.1.129.Final and 4.2.8.Final. No known workarounds exist.(CVE-2025-59419)

Database specific
{
    "severity": "Medium"
}
References

Affected packages

openEuler:24.03-LTS / netty

Package

Name
netty
Purl
pkg:rpm/openEuler/netty&distro=openEuler-24.03-LTS

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.1.13-24.oe2403

Ecosystem specific

{
    "src": [
        "netty-4.1.13-24.oe2403.src.rpm"
    ],
    "aarch64": [
        "netty-4.1.13-24.oe2403.aarch64.rpm"
    ],
    "noarch": [
        "netty-help-4.1.13-24.oe2403.noarch.rpm"
    ],
    "x86_64": [
        "netty-4.1.13-24.oe2403.x86_64.rpm"
    ]
}