DEBIAN-CVE-2026-42579

Source
https://security-tracker.debian.org/tracker/CVE-2026-42579
Import Source
https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2026-42579.json
JSON Data
https://api.test.osv.dev/v1/vulns/DEBIAN-CVE-2026-42579
Upstream
Published
2026-05-13T19:17:23.353Z
Modified
2026-05-19T09:00:11.423208913Z
Severity
  • 9.1 (Critical) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H CVSS Calculator
Summary
[none]
Details

Netty is an asynchronous, event-driven network application framework. Prior to 4.2.13.Final and 4.1.133.Final, Netty's DNS codec does not enforce RFC 1035 domain name constraints during either encoding or decoding. This creates a bidirectional attack surface: malicious DNS responses can exploit the decoder, and user-influenced hostnames can exploit the encoder. This vulnerability is fixed in 4.2.13.Final and 4.1.133.Final.

References

Affected packages

Debian:11 / netty

Package

Name
netty
Purl
pkg:deb/debian/netty?arch=source&distro=bullseye

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1:4.*
1:4.1.48-4
1:4.1.48-4+deb11u1
1:4.1.48-4+deb11u2
1:4.1.48-4+deb11u3
1:4.1.48-5
1:4.1.48-6
1:4.1.48-7
1:4.1.48-8
1:4.1.48-9
1:4.1.48-10
1:4.1.48-11
1:4.1.48-12
1:4.1.48-13
1:4.1.48-14
1:4.1.48-15
1:4.1.48-16

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2026-42579.json"

Debian:12 / netty

Package

Name
netty
Purl
pkg:deb/debian/netty?arch=source&distro=bookworm

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1:4.*
1:4.1.48-7
1:4.1.48-7+deb12u1
1:4.1.48-7+deb12u2
1:4.1.48-8
1:4.1.48-9
1:4.1.48-10
1:4.1.48-11
1:4.1.48-12
1:4.1.48-13
1:4.1.48-14
1:4.1.48-15
1:4.1.48-16

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2026-42579.json"

Debian:13 / netty

Package

Name
netty
Purl
pkg:deb/debian/netty?arch=source&distro=trixie

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1:4.*
1:4.1.48-10
1:4.1.48-10+deb13u1
1:4.1.48-11
1:4.1.48-12
1:4.1.48-13
1:4.1.48-14
1:4.1.48-15
1:4.1.48-16

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2026-42579.json"

Debian:14 / netty

Package

Name
netty
Purl
pkg:deb/debian/netty?arch=source&distro=forky

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1:4.*
1:4.1.48-10
1:4.1.48-11
1:4.1.48-12
1:4.1.48-13
1:4.1.48-14
1:4.1.48-15
1:4.1.48-16

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2026-42579.json"