[ 
https://issues.apache.org/jira/browse/HBASE-29655?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Xavier Fernandis updated HBASE-29655:
-------------------------------------
    Description: 
*ISSUE SUMMARY*
HBase master branch uses Netty 4.1.123.Final which contains 2 active CVEs that 
require immediate attention.
Both vulnerabilities are network-exploitable DoS attacks that could impact 
production systems.

 

*CURRENT SITUATION*
- Current Version: io.netty:netty-all:4.1.123.Final (used via hbase-thirdparty 
4.1.12)
- Location: org.apache.hbase.thirdparty:hbase-shaded-netty
- Vulnerabilities Found: 2 active CVEs
- Risk Level: HIGH (network-exploitable DoS attacks)

 

*VULNERABILITY DETAILS*

1. {color:#FF0000}*CVE-2025-58057*{color} - Decompression DoS Attack
- CVSS Score: 6.9 (Moderate)
- Affected Versions: Netty <= 4.1.124.Final
- Fixed Version: 4.1.125.Final
- Reference: 
https://github.com/netty/netty/security/advisories/GHSA-3p8m-j85q-pgmj

 

2. *CVE-2025-55163* - MadeYouReset HTTP/2 DDoS
- CVSS Score: Moderate
- Affected Versions: netty-codec-http2 <= 4.1.123.Final  
- Fixed Version: 4.1.124.Final
- Attack Vector: Network-based HTTP/2 protocol vulnerability
- Reference: 
https://github.com/netty/netty/security/advisories/GHSA-prj3-ccx8-p6x4

 

*IMPACT ASSESSMENT*

HBase uses netty-all which is a fat jar containing ALL Netty modules, including:
- netty-codec-http2 (vulnerable to CVE-2025-55163)
- netty-codec with decompression codecs (vulnerable to CVE-2025-58057)


*Dependency Chain:*
HBase -> org.apache.hbase.thirdparty:hbase-shaded-netty -> 
io.netty:netty-all:4.1.123.Final


*RECOMMENDED SOLUTION*

Immediate Action Required:
1. Upgrade Netty to 4.1.125.Final - This fixes both CVEs


*REFERENCES*
- Netty Security Advisories: https://github.com/netty/netty/security/advisories
- CVE-2025-58057: 
https://github.com/netty/netty/security/advisories/GHSA-3p8m-j85q-pgmj
- CVE-2025-55163: 
https://github.com/netty/netty/security/advisories/GHSA-prj3-ccx8-p6x4
- HBase Thirdparty: https://github.com/apache/hbase-thirdparty
- HBase Main: https://github.com/apache/hbase
- Similar Issue Reference: https://issues.apache.org/jira/browse/HBASE-29651

 

  was:
### __Current Situation__

- __Current Version__: `io.netty:netty-all:4.1.123.Final` (used via 
hbase-thirdparty)
- __Vulnerabilities Found__: 2 active CVEs
- __Risk Level__: HIGH (network-exploitable DoS attacks)

### __CVE Details__

#### __1. CVE-2025-58057 - Decompression DoS Attack__

- __CVSS Score__: 6.9 (Moderate)
- __Affected Versions__: Netty <= 4.1.124.Final
- __Fixed Version__: 4.1.125.Final
- __Attack Vector__: Network-based, no authentication required
- __Impact__: Denial of Service via zip bomb style attack in BrotliDecoder and 
other decompression codecs
- __Reference__: 
[](https://github.com/netty/netty/security/advisories/GHSA-3p8m-j85q-pgmj)<https://github.com/netty/netty/security/advisories/GHSA-3p8m-j85q-pgmj>

#### __2. CVE-2025-55163 - MadeYouReset HTTP/2 DDoS__

- __CVSS Score__: Moderate
- __Affected Versions__: netty-codec-http2 <= 4.1.123.Final
- __Fixed Version__: 4.1.124.Final
- __Attack Vector__: Network-based HTTP/2 protocol vulnerability
- __Impact__: Allows unbounded concurrent streams leading to resource exhaustion
- __Reference__: 
[](https://github.com/netty/netty/security/advisories/GHSA-prj3-ccx8-p6x4)<https://github.com/netty/netty/security/advisories/GHSA-prj3-ccx8-p6x4>

### __Why HBase is Affected__

HBase uses `netty-all` which is a fat jar containing ALL Netty modules, 
including:

- `netty-codec-http2` (vulnerable to CVE-2025-55163)
- `netty-codec` with decompression codecs (vulnerable to CVE-2025-58057)

### __Fix Recommendations__

#### __Immediate Action Required__

1. __Upgrade Netty to 4.1.125.Final__ - This fixes both CVEs

2. __Two-step upgrade process required__:

   - First: Update hbase-thirdparty repository
   - Second: Update main HBase to use new hbase-thirdparty version

#### __Technical Implementation__

1. __hbase-thirdparty changes__:

   - Repository: 
[](https://github.com/apache/hbase-thirdparty)<https://github.com/apache/hbase-thirdparty>
   - Update `${netty.version}` property to `4.1.125.Final`
   - Release new hbase-thirdparty version

2. __HBase main repository changes__:

   - Update `<hbase-thirdparty.version>` to new version
   - Test compatibility with upgraded Netty

### __References__

- Netty Security Advisories: 
[](https://github.com/netty/netty/security/advisories)<https://github.com/netty/netty/security/advisories>
- CVE-2025-58057: 
[](https://github.com/netty/netty/security/advisories/GHSA-3p8m-j85q-pgmj)<https://github.com/netty/netty/security/advisories/GHSA-3p8m-j85q-pgmj>
- CVE-2025-55163: 
[](https://github.com/netty/netty/security/advisories/GHSA-prj3-ccx8-p6x4)<https://github.com/netty/netty/security/advisories/GHSA-prj3-ccx8-p6x4>
- HBase Thirdparty: 
[](https://github.com/apache/hbase-thirdparty)<https://github.com/apache/hbase-thirdparty>


> Bumping up the netty version in Hbase-thrid party to 4.1.125.Final.
> -------------------------------------------------------------------
>
>                 Key: HBASE-29655
>                 URL: https://issues.apache.org/jira/browse/HBASE-29655
>             Project: HBase
>          Issue Type: Bug
>            Reporter: Xavier Fernandis
>            Priority: Major
>
> *ISSUE SUMMARY*
> HBase master branch uses Netty 4.1.123.Final which contains 2 active CVEs 
> that require immediate attention.
> Both vulnerabilities are network-exploitable DoS attacks that could impact 
> production systems.
>  
> *CURRENT SITUATION*
> - Current Version: io.netty:netty-all:4.1.123.Final (used via 
> hbase-thirdparty 4.1.12)
> - Location: org.apache.hbase.thirdparty:hbase-shaded-netty
> - Vulnerabilities Found: 2 active CVEs
> - Risk Level: HIGH (network-exploitable DoS attacks)
>  
> *VULNERABILITY DETAILS*
> 1. {color:#FF0000}*CVE-2025-58057*{color} - Decompression DoS Attack
> - CVSS Score: 6.9 (Moderate)
> - Affected Versions: Netty <= 4.1.124.Final
> - Fixed Version: 4.1.125.Final
> - Reference: 
> https://github.com/netty/netty/security/advisories/GHSA-3p8m-j85q-pgmj
>  
> 2. *CVE-2025-55163* - MadeYouReset HTTP/2 DDoS
> - CVSS Score: Moderate
> - Affected Versions: netty-codec-http2 <= 4.1.123.Final  
> - Fixed Version: 4.1.124.Final
> - Attack Vector: Network-based HTTP/2 protocol vulnerability
> - Reference: 
> https://github.com/netty/netty/security/advisories/GHSA-prj3-ccx8-p6x4
>  
> *IMPACT ASSESSMENT*
> HBase uses netty-all which is a fat jar containing ALL Netty modules, 
> including:
> - netty-codec-http2 (vulnerable to CVE-2025-55163)
> - netty-codec with decompression codecs (vulnerable to CVE-2025-58057)
> *Dependency Chain:*
> HBase -> org.apache.hbase.thirdparty:hbase-shaded-netty -> 
> io.netty:netty-all:4.1.123.Final
> *RECOMMENDED SOLUTION*
> Immediate Action Required:
> 1. Upgrade Netty to 4.1.125.Final - This fixes both CVEs
> *REFERENCES*
> - Netty Security Advisories: 
> https://github.com/netty/netty/security/advisories
> - CVE-2025-58057: 
> https://github.com/netty/netty/security/advisories/GHSA-3p8m-j85q-pgmj
> - CVE-2025-55163: 
> https://github.com/netty/netty/security/advisories/GHSA-prj3-ccx8-p6x4
> - HBase Thirdparty: https://github.com/apache/hbase-thirdparty
> - HBase Main: https://github.com/apache/hbase
> - Similar Issue Reference: https://issues.apache.org/jira/browse/HBASE-29651
>  



--
This message was sent by Atlassian Jira
(v8.20.10#820010)

Reply via email to