CVE-2026-42577: Netty epoll transport denial of service via RST on half-closed TCP connection
Netty’s epoll transport fails to detect and close TCP connections that receive a RST after being half-closed, leading to stale channels that are never cleaned up and, in some code paths, a 100% CPU busy-loop in the event loop thread.
References
Code Behaviors & Features
Detect and mitigate CVE-2026-42577 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →