-
Notifications
You must be signed in to change notification settings - Fork 977
Description
Describe the bug
Please See : https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24970
Presently netty-nio-client is using net-handler:4.1.116, that has following vulnerability
SslHandler doesn't correctly validate packets which can lead to native crash when using native SSLEngine
Short dependency chart:
[INFO] | +- software.amazon.awssdk:netty-nio-client:jar:2.30.26:compile
[INFO] | | +- io.netty:netty-handler:jar:4.1.116.Final:compile
Details are available at GHSA-4g8c-wm8x-jfhw
Impact
When a special crafted packet is received via SslHandler it doesn't correctly handle validation of such a packet in all cases which can lead to a native crash.
Regression Issue
- Select this option if this issue appears to be a regression.
Expected Behavior
There should be no Critical or high level vulnerability reported.
Current Behavior
It has a following high vulnerability:
CVE-2025-24970 : SslHandler doesn't correctly validate packets which can lead to native crash when using native SSLEngine
Reproduction Steps
<dependency>
<groupId>software.amazon.awssdk</groupId>
<artifactId>netty-nio-client</artifactId>
<version>2.30.27</version>
</dependency>
Possible Solution
Upgrade the dependent io.netty/netty-handler:4.1.116.Final to version 4.1.118.Final or above.
Additional Information/Context
No response
AWS Java SDK version used
software.amazon.awssdk:aws-core:jar:2.30.26
JDK version used
openjdk version "21.0.6" 2025-01-21 OpenJDK Runtime Environment Homebrew (build 21.0.6) OpenJDK 64-Bit Server VM Homebrew (build 21.0.6, mixed mode, sharing)
Operating System and version
ProductName: macOS ProductVersion: 15.2 BuildVersion: 24C101