In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsUpgrade io.netty:netty-transport-classes-epoll to version 4.2.13.Final or higher.
Affected versions of this package are vulnerable to Missing Release of Resource after Effective Lifetime in the handling of TCP connections with ALLOW_HALF_CLOSURE enabled when a remote peer sends a FIN followed by a RST. An attacker can cause resource exhaustion or high CPU utilization by repeatedly establishing such connections and triggering the described sequence, leading to stale channels that are never cleaned up and potential CPU busy-loops in the event loop thread.
This vulnerability can be mitigated by configuring idle timeouts on connections to limit the lifetime of stale channels.