[ 
https://issues.apache.org/jira/browse/ZOOKEEPER-4980?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=18022088#comment-18022088
 ] 

Aleksandr Nikolaev commented on ZOOKEEPER-4980:
-----------------------------------------------

[~dpramod]  updated by me in 
https://issues.apache.org/jira/browse/ZOOKEEPER-4976

> Upgrade netty to fix CVE-2025-58057 , CVE-2025-58056 
> -----------------------------------------------------
>
>                 Key: ZOOKEEPER-4980
>                 URL: https://issues.apache.org/jira/browse/ZOOKEEPER-4980
>             Project: ZooKeeper
>          Issue Type: Improvement
>            Reporter: Dhoka Pramod
>            Priority: Major
>
> CVE ID: CVE-2025-58057 , CVE-2025-58056 
> Affected ZooKeeper Version: 3.9.4
> Vulnerable Dependency: Netty 4.1.119
> Impact: Netty is an asynchronous event-driven network application framework 
> for development of maintainable high performance protocol servers and 
> clients. In versions 4.1.124.Final, and 4.2.0.Alpha3 through 4.2.4.Final, 
> Netty incorrectly accepts standalone newline characters (LF) as a chunk-size 
> line terminator, regardless of a preceding carriage return (CR), instead of 
> requiring CRLF per HTTP/1.1 standards. When combined with reverse proxies 
> that parse LF differently (treating it as part of the chunk extension), 
> attackers can craft requests that the proxy sees as one request but Netty 
> processes as two, enabling request smuggling attacks. 
> Fix : This is fixed in versions 4.1.125.Final and 4.2.5.Final.



--
This message was sent by Atlassian Jira
(v8.20.10#820010)

Reply via email to