← Back to CVEs
CVE-2026-42582
HIGH7.5
Description
Netty is an asynchronous, event-driven network application framework. Prior to 4.2.13.Final, when decoding header blocks, the non-Huffman branch of io.netty.handler.codec.http3.QpackDecoder#decodeHuffmanEncodedLiteral may execute new byte[length] for a string literal before verifying that length bytes are actually present in the compressed field section. The wire encoding allows a very large length to be expressed in few bytes. There is no check that length <= in.readableBytes() before new byte[length]. This vulnerability is fixed in 4.2.13.Final.
CVE Details
CVSS v3.1 Score7.5
SeverityHIGH
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Attack VectorNETWORK
ComplexityLOW
Privileges RequiredNONE
User InteractionNONE
Published5/13/2026
Last Modified5/13/2026
Sourcenvd
Honeypot Sightings0
Weaknesses (CWE)
CWE-770CWE-789
References
https://github.com/netty/netty/security/advisories/GHSA-2c5c-chwr-9hqw(security-advisories@github.com)
https://github.com/netty/netty/security/advisories/GHSA-2c5c-chwr-9hqw(134c704f-9b21-4f2e-91b3-4a467353bcc0)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.