Netty is an asynchronous, event-driven network application framework. Prior to 4.2.13.Final and 4.1.133.Final, Netty's chunk size parser silently overflows int, enabling request smuggling attacks. This vulnerability is fixed in 4.2.13.Final and 4.1.133.Final.
Metrics
Affected Vendors & Products
References
History
Wed, 13 May 2026 18:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Netty is an asynchronous, event-driven network application framework. Prior to 4.2.13.Final and 4.1.133.Final, Netty's chunk size parser silently overflows int, enabling request smuggling attacks. This vulnerability is fixed in 4.2.13.Final and 4.1.133.Final. | |
| Title | Netty: HTTP Request Smuggling due to incorrect chunk size parsing | |
| Weaknesses | CWE-190 CWE-444 |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-05-13T18:04:03.690Z
Reserved: 2026-04-28T17:26:12.085Z
Link: CVE-2026-42580
No data.
Status : Received
Published: 2026-05-13T19:17:23.490
Modified: 2026-05-13T19:17:23.490
Link: CVE-2026-42580
No data.
OpenCVE Enrichment
Updated: 2026-05-13T19:45:03Z