Security update for netty, netty-tcnative

Announcement ID: SUSE-SU-2026:1353-1
Release Date: 2026-04-15T13:37:31Z
Rating: important
References:
Cross-References:
CVSS scores:
  • CVE-2026-33870 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
  • CVE-2026-33870 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
  • CVE-2026-33870 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
  • CVE-2026-33871 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2026-33871 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
  • CVE-2026-33871 ( NVD ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
  • CVE-2026-33871 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Affected Products:
  • Development Tools Module 15-SP7
  • openSUSE Leap 15.6
  • SUSE Linux Enterprise Desktop 15 SP7
  • SUSE Linux Enterprise Real Time 15 SP7
  • SUSE Linux Enterprise Server 15 SP7
  • SUSE Linux Enterprise Server for SAP Applications 15 SP7
  • SUSE Package Hub 15 15-SP7

An update that solves two vulnerabilities can now be installed.

Description:

This update for netty, netty-tcnative fixes the following issues:

Upidate to 4.1.132:

  • CVE-2026-33870: incorrectly parses quoted strings in HTTP/1.1 can lead to request smuggling (bsc#1261031).
  • CVE-2026-33871: sending a flood of CONTINUATION frames can lead to a denial of service (bsc#1261043).

Changelog:

  • Upgrade to upstream version 4.1.132
  • Fixes:
  • Fix Incorrect nanos-to-millis conversion in epoll_wait EINTR retry loop
  • Make RefCntOpenSslContext.deallocate more robust
  • HTTP2: Correctly account for padding when decompress
  • Fix high-order bit aliasing in HttpUtil.validateToken
  • fix: the precedence of + is higher than >>
  • AdaptiveByteBufAllocator: make sure byteBuf.capacity() not greater than byteBuf.maxCapacity()
  • AdaptivePoolingAllocator: call unreserveMatchingBuddy(...) if byteBuf initialization failed
  • Don't assume CertificateFactory is thread-safe
  • Fix HttpObjectAggregator leaving connection stuck after 413 with AUTO_READ=false
  • HTTP2: Ensure preface is flushed in all cases
  • Fix UnsupportedOperationException in readTrailingHeaders
  • Fix client_max_window_bits parameter handling in permessage-deflate extension
  • Native transports: Fix possible fd leak when fcntl fails.
  • Kqueue: Fix undefined behaviour when GetStringUTFChars fails and SO_ACCEPTFILTER is supported
  • Kqueue: Possible overflow when using netty_kqueue_bsdsocket_setAcceptFilter(...)
  • Native transports: Fix undefined behaviour when GetStringUTFChars fails while open FD
  • Epoll: Add null checks for safety reasons
  • Epoll: Use correct value to initialize mmsghdr.msg_namelen
  • Epoll: Fix support for IP_RECVORIGDSTADDR
  • AdaptivePoolingAllocator: remove ensureAccessible() call in capacity(int) method
  • Epoll: setTcpMg5Sig(...) might overflow
  • JdkZlibDecoder: accumulate decompressed output before firing channelRead
  • Limit the number of Continuation frames per HTTP2 Headers (bsc#1261043, CVE-2026-33871)
  • Stricter HTTP/1.1 chunk extension parsing (bsc#1261031, CVE-2026-33870)
  • rediff
  • Upgrade to upstream version 4.1.131
  • NioDatagramChannel.block(...) does not early return on failure
  • Support for AWS Libcrypto (AWS-LC) netty-tcnative build
  • codec-dns: Decompress MX RDATA exchange domain names during DNS record decoding
  • Buddy allocation for large buffers in adaptive allocator
  • SslHandler: Only resume on EventLoop if EventLoop is not shutting down already
  • Wrap ECONNREFUSED in PortUnreachableException for UDP
  • Bump com.ning:compress-lzf (4.1)
  • Fix adaptive allocator bug from not noticing failed allocation
  • Avoid loosing original read exception
  • Backport multiple adaptive allocator changes
  • Upgrade to version 4.1.130
  • Upgrade to version 2.0.75 Final
  • No formal changelog present
  • Needed by netty >= 4.2.11

Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

  • openSUSE Leap 15.6
    zypper in -t patch openSUSE-SLE-15.6-2026-1353=1
  • Development Tools Module 15-SP7
    zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP7-2026-1353=1
  • SUSE Package Hub 15 15-SP7
    zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP7-2026-1353=1

Package List:

  • openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
    • netty-tcnative-2.0.75-150200.3.36.1
    • netty-4.1.132-150200.4.43.1
  • openSUSE Leap 15.6 (noarch)
    • netty-tcnative-javadoc-2.0.75-150200.3.36.1
    • netty-javadoc-4.1.132-150200.4.43.1
  • Development Tools Module 15-SP7 (aarch64 ppc64le s390x x86_64)
    • netty-tcnative-2.0.75-150200.3.36.1
    • netty-tcnative-debugsource-2.0.75-150200.3.36.1
  • SUSE Package Hub 15 15-SP7 (aarch64 ppc64le s390x x86_64)
    • netty-4.1.132-150200.4.43.1
  • SUSE Package Hub 15 15-SP7 (noarch)
    • netty-javadoc-4.1.132-150200.4.43.1

References: