CVE-2025-58056

Publication date 3 September 2025

Last updated 10 December 2025


Ubuntu priority

Description

Netty is an asynchronous event-driven network application framework for development of maintainable high performance protocol servers and clients. In versions 4.1.124.Final, and 4.2.0.Alpha3 through 4.2.4.Final, Netty incorrectly accepts standalone newline characters (LF) as a chunk-size line terminator, regardless of a preceding carriage return (CR), instead of requiring CRLF per HTTP/1.1 standards. When combined with reverse proxies that parse LF differently (treating it as part of the chunk extension), attackers can craft requests that the proxy sees as one request but Netty processes as two, enabling request smuggling attacks. This is fixed in versions 4.1.125.Final and 4.2.5.Final.

Why is this CVE low priority?

http smuggling issue

Learn more about Ubuntu priority

Status

Package Ubuntu Release Status
netty-3.9 25.10 questing Not in release
25.04 plucky Not in release
24.04 LTS noble Not in release
22.04 LTS jammy Not in release
18.04 LTS bionic
Needs evaluation
16.04 LTS xenial
Needs evaluation
netty 25.10 questing
Fixed 1:4.1.48-10ubuntu0.25.10.2
25.04 plucky
Fixed 1:4.1.48-10ubuntu0.25.04.2
24.04 LTS noble
Fixed 1:4.1.48-9ubuntu0.1
22.04 LTS jammy
Fixed 1:4.1.48-4+deb11u2ubuntu0.1
20.04 LTS focal
Fixed 1:4.1.45-1ubuntu0.1~esm4
18.04 LTS bionic
Fixed 1:4.1.7-4ubuntu0.1+esm5
16.04 LTS xenial
Fixed 1:4.0.34-1ubuntu0.1~esm3
14.04 LTS trusty Ignored backport too intrusive

Get expanded security coverage with Ubuntu Pro

Reduce your average CVE exposure time from 98 days to 1 day with expanded CVE patching, ten-years security maintenance and optional support for the full stack of open-source applications. Free for personal use.

Get Ubuntu Pro 30-day free trial

Patch details

For informational purposes only. We recommend not to cherry-pick updates. How can I get the fixes?

Package Patch details
netty