Skip navigation

Netty 4.2.5.Final released

We are happy to announce the release of netty 4.2.5.Final. This is a bug-fix release which also contains a 2 security fixes, CVE-2025-58057 and CVE-2025-58056.

The most important changes are:

  • Decompression codecs vulnerable to DoS via zip bomb style attack (CVE-2025-58057)
  • Request smuggling due to incorrect parsing of chunk extensions (CVE-2025-58056)
  • Only register chunk sizes in adaptive allocator (#15575)
  • Always load BouncyCastle classes with the Netty classloader (#15569)
  • Update to quiche 0.24.5 (#15556)
  • Clean up netty-buffer Import-Package (#15562)
  • Don't try to handle incomplete upgrade request (#15581)
  • SubmissionQueue::toString should iterate from the head (#15586)
  • Implement automatic scaling for EventLoopGroup threads (#15524)
  • Drop unknown frame on missing stream (#15592)
  • IoUring: Reduce redundant system calls (#15591)
  • IoUring: Always correctly handle result for zero copy (#15600)
  • Fix IllegalReferenceCountException on invalid upgrade response (#15602)

For more details please visit our bug tracker

Thank You

Every idea and bug-report counts, and so we thought it is worth mentioning those who helped in this area.

Please report an unintended omission * @brucelwl * @bryce-anderson * @chrisvest * @doom369 * @dreamlike-ocean * @franz1981 * @georgebanasios * @He-Pin * @isaacrivriv * @linking12 * @m1ngyuan * @normanmaurer * @rovarga * @scotthraban * @vietj * @violetagg * @yawkat