Overview
Description
Netty is an asynchronous event-driven network application framework for rapid development of maintainable high performance protocol servers & clients. In netty-codec-compression versions 4.1.124.Final and below, and netty-codec versions 4.2.4.Final and below, when supplied with specially crafted input, BrotliDecoder and certain other decompression decoders will allocate a large number of reachable byte buffers, which can lead to denial of service. BrotliDecoder.decompress has no limit in how often it calls pull, decompressing data 64K bytes at a time. The buffers are saved in the output list, and remain reachable until OOM is hit. This is fixed in versions 4.1.125.Final of netty-codec and 4.2.5.Final of netty-codec-compression.
Statistics
- 2 Posts
- 1 Interaction
Last activity: 16 hours ago
Bluesky
Dataproc Serverless update on March 18, 2026 https://docs.cloud.google.com/dataproc-serverless/docs/release-notes/#March_18_2026 #googlecloud Fixed CVEs CVE-2025-58057, CVE-2025-53864, CVE-2025-68161, CVE-2025-48924, and CVE-2025-33042
Overview
- Apache Software Foundation
- Apache Log4j Core
- org.apache.logging.log4j:log4j-core
18 Dec 2025
Published
20 Jan 2026
Updated
CVSS
Pending
EPSS
0.03%
KEV
Description
The Socket Appender in Apache Log4j Core versions 2.0-beta9 through 2.25.2 does not perform TLS hostname verification of the peer certificate, even when the verifyHostName https://logging.apache.org/log4j/2.x/manual/appenders/network.html#SslConfiguration-attr-verifyHostName configuration attribute or the log4j2.sslVerifyHostName https://logging.apache.org/log4j/2.x/manual/systemproperties.html#log4j2.sslVerifyHostName system property is set to true.
This issue may allow a man-in-the-middle attacker to intercept or redirect log traffic under the following conditions:
* The attacker is able to intercept or redirect network traffic between the client and the log receiver.
* The attacker can present a server certificate issued by a certification authority trusted by the Socket Appender’s configured trust store (or by the default Java trust store if no custom trust store is configured).
Users are advised to upgrade to Apache Log4j Core version 2.25.3, which addresses this issue.
As an alternative mitigation, the Socket Appender may be configured to use a private or restricted trust root to limit the set of trusted certificates.
Statistics
- 2 Posts
- 1 Interaction
Last activity: 16 hours ago
Bluesky
Dataproc Serverless update on March 18, 2026 https://docs.cloud.google.com/dataproc-serverless/docs/release-notes/#March_18_2026 #googlecloud Fixed CVEs CVE-2025-58057, CVE-2025-53864, CVE-2025-68161, CVE-2025-48924, and CVE-2025-33042
Overview
- Apache Software Foundation
- Apache Commons Lang
- commons-lang:commons-lang
11 Jul 2025
Published
04 Nov 2025
Updated
CVSS
Pending
EPSS
0.02%
KEV
Description
Uncontrolled Recursion vulnerability in Apache Commons Lang.
This issue affects Apache Commons Lang: Starting with commons-lang:commons-lang 2.0 to 2.6, and, from org.apache.commons:commons-lang3 3.0 before 3.18.0.
The methods ClassUtils.getClass(...) can throw StackOverflowError on very long inputs. Because an Error is usually not handled by applications and libraries, a
StackOverflowError could cause an application to stop.
Users are recommended to upgrade to version 3.18.0, which fixes the issue.
Statistics
- 2 Posts
- 1 Interaction
Last activity: 16 hours ago
Bluesky
Dataproc Serverless update on March 18, 2026 https://docs.cloud.google.com/dataproc-serverless/docs/release-notes/#March_18_2026 #googlecloud Fixed CVEs CVE-2025-58057, CVE-2025-53864, CVE-2025-68161, CVE-2025-48924, and CVE-2025-33042