<div class="container">
    <h1>Security update for netty, netty-tcnative</h1>

    <table class="table table-striped table-bordered">
        <tbody>
        <tr>
            <th>Announcement ID:</th>
            <td>SUSE-SU-2025:03114-1</td>
        </tr>
        <tr>
            <th>Release Date:</th>
            <td>2025-09-09T10:36:11Z</td>
        </tr>
        
        <tr>
            <th>Rating:</th>
            <td>important</td>
        </tr>
        <tr>
            <th>References:</th>
            <td>
                <ul>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1247991">bsc#1247991</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1249116">bsc#1249116</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1249134">bsc#1249134</a>
                        </li>
                    
                    
                </ul>
            </td>
        </tr>
        
            <tr>
                <th>
                    Cross-References:
                </th>
                <td>
                    <ul>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2025-55163.html">CVE-2025-55163</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2025-58056.html">CVE-2025-58056</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2025-58057.html">CVE-2025-58057</a>
                        </li>
                    
                    </ul>
                </td>
            </tr>
            <tr>
                <th>CVSS scores:</th>
                <td>
                    <ul class="list-group">
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2025-55163</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">8.7</span>
                                <span class="cvss-vector">CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2025-55163</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">7.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2025-55163</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">8.2</span>
                                <span class="cvss-vector">CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2025-58056</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">2.9</span>
                                <span class="cvss-vector">CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2025-58056</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">7.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2025-58057</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">6.9</span>
                                <span class="cvss-vector">CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2025-58057</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.3</span>
                                <span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2025-58057</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">6.9</span>
                                <span class="cvss-vector">CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2025-58057</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">7.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                    </ul>
                </td>
            </tr>
        
        <tr>
            <th>Affected Products:</th>
            <td>
                <ul class="list-group">
                    
                        <li class="list-group-item">Development Tools Module 15-SP6</li>
                    
                        <li class="list-group-item">Development Tools Module 15-SP7</li>
                    
                        <li class="list-group-item">openSUSE Leap 15.6</li>
                    
                        <li class="list-group-item">SUSE Enterprise Storage 7.1</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Desktop 15 SP6</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Desktop 15 SP7</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise High Performance Computing 15 SP3</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise High Performance Computing 15 SP4</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise High Performance Computing 15 SP5</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise High Performance Computing LTSS 15 SP3</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise High Performance Computing LTSS 15 SP4</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise High Performance Computing LTSS 15 SP5</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Real Time 15 SP6</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Real Time 15 SP7</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Server 15 SP3</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Server 15 SP3 LTSS</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Server 15 SP4</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Server 15 SP4 LTSS</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Server 15 SP5</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Server 15 SP5 LTSS</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Server 15 SP6</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Server 15 SP7</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Server for SAP Applications 15 SP3</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Server for SAP Applications 15 SP4</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Server for SAP Applications 15 SP5</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Server for SAP Applications 15 SP6</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Server for SAP Applications 15 SP7</li>
                    
                        <li class="list-group-item">SUSE Package Hub 15 15-SP6</li>
                    
                        <li class="list-group-item">SUSE Package Hub 15 15-SP7</li>
                    
                </ul>
            </td>
        </tr>
        </tbody>
    </table>

    <p>An update that solves three vulnerabilities can now be installed.</p>

    


    
        <h2>Description:</h2>
    
    <p>This update for netty, netty-tcnative fixes the following issues:</p>
<p>Upgrade to upstream version 4.1.126.</p>
<p>Security issues fixed:</p>
<ul>
<li>CVE-2025-58057: decompression codecs allocating a large number of buffers after processing specially crafted input can
  cause a denial of service (bsc#1249134).</li>
<li>CVE-2025-58056: incorrect parsing of chunk extensions can lead to request smuggling (bsc#1249116).</li>
<li>CVE-2025-55163: "MadeYouReset" denial of serivce attack in the HTTP/2 protocol (bsc#1247991).</li>
</ul>
<p>Other issues fixed:</p>
<ul>
<li>Fixes from version 4.1.126</li>
<li>Fix IllegalReferenceCountException on invalid upgrade response.</li>
<li>Drop unknown frame on missing stream.</li>
<li>Don&#x27;t try to handle incomplete upgrade request.</li>
<li>
<p>Update to netty-tcnative 2.0.73Final.</p>
</li>
<li>
<p>Fixes from version 4.1.124</p>
</li>
<li>Fix NPE and AssertionErrors when many tasks are scheduled and cancelled.</li>
<li>HTTP2: Http2ConnectionHandler should always use Http2ConnectionEncoder.</li>
<li>Epoll: Correctly handle UDP packets with source port of 0.</li>
<li>Fix netty-common OSGi Import-Package header.</li>
<li>
<p>MqttConnectPayload.toString() includes password.</p>
</li>
<li>
<p>Fixes from version 4.1.123</p>
</li>
<li>Fix chunk reuse bug in adaptive allocator.</li>
<li>More accurate adaptive memory usage accounting.</li>
<li>Introduce size-classes for the adaptive allocator.</li>
<li>Reduce magazine proliferation eagerness.</li>
<li>Fix concurrent ByteBuffer access issue in AdaptiveByteBuf.getBytes.</li>
<li>Fix possible buffer corruption caused by incorrect setCharSequence(...) implementation.</li>
<li>AdaptiveByteBuf: Fix AdaptiveByteBuf.maxFastWritableBytes() to take writerIndex() into account.</li>
<li>Optimize capacity bumping for adaptive ByteBufs.</li>
<li>AbstractDnsRecord: equals() and hashCode() to ignore name field&#x27;s case.</li>
<li>Backport Unsafe guards.</li>
<li>Guard recomputed offset access with hasUnsafe.</li>
<li>HTTP2: Always produce a RST frame on stream exception.</li>
<li>
<p>Correct what artifacts included in netty-bom.</p>
</li>
<li>
<p>Fixes from version 4.1.122</p>
</li>
<li>DirContextUtils.addNameServer(...) should just catch Exception internally.</li>
<li>Make public API specify explicit maxAllocation to prevent OOM.</li>
<li>Fix concurrent ByteBuf write access bug in adaptive allocator.</li>
<li>Fix transport-native-kqueue Bundle-SymbolicNames.</li>
<li>Fix resolver-dns-native-macos Bundle-SymbolicNames.</li>
<li>Always correctly calculate the memory address of the ByteBuf even if sun.misc.Unsafe is not usable.</li>
<li>Upgrade lz4 dependencies as the old version did not correctly handle ByteBuffer that have an arrayOffset > 0.</li>
<li>Optimize ByteBuf.setCharSequence for adaptive allocator.</li>
<li>Kqueue: Fix registration failure when fd is reused.</li>
<li>Make JdkZlibEncoder accept Deflater.DEFAULT_COMPRESSION as level.</li>
<li>Ensure OpenSsl.availableJavaCipherSuites does not contain null values.</li>
<li>Always prefer direct buffers for pooled allocators if not explicit disabled.</li>
<li>Update to netty-tcnative 2.0.72.Final.</li>
<li>Re-enable sun.misc.Unsafe by default on Java 24+.</li>
<li>
<p>Kqueue: Delay removal from registration map to fix noisy warnings.</p>
</li>
<li>
<p>Fixes from version 4.1.121</p>
</li>
<li>Epoll.isAvailable() returns false on Ubuntu 20.04/22.04 arch amd64.</li>
<li>
<p>Fix transport-native-epoll Bundle-SymbolicNames.</p>
</li>
<li>
<p>Fixes from version 4.1.120</p>
</li>
<li>Fix flawed termination condition check in HttpPostRequestEncoder#encodeNextChunkUrlEncoded(int) for current
    InterfaceHttpData.</li>
<li>Exposed decoderEnforceMaxConsecutiveEmptyDataFrames and decoderEnforceMaxRstFramesPerWindow.</li>
<li>ThreadExecutorMap must restore old EventExecutor.</li>
<li>Make Recycler virtual thread friendly.</li>
<li>Disable sun.misc.Unsafe by default on Java 24+.</li>
<li>Adaptive: Correctly enforce leak detection when using AdaptiveByteBufAllocator.</li>
<li>Add suppressed exception to original cause when calling Future.sync*.</li>
<li>Add SETTINGS_ENABLE_CONNECT_PROTOCOL to the default HTTP/2 settings.</li>
<li>Correct computation for suboptimal chunk retirement probability.</li>
<li>Fix bug in method AdaptivePoolingAllocator.allocateWithoutLock(...).</li>
<li>Fix a Bytebuf leak in TcpDnsQueryDecoder.</li>
<li>SSL: Clear native error if named group is not supported.</li>
<li>WebSocketClientCompressionHandler shouldn&#x27;t claim window bits support when jzlib is not available.</li>
<li>
<p>Fix the assignment error of maxQoS parameter in ConnAck Properties.</p>
</li>
<li>
<p>Fixes from version 4.1.119</p>
</li>
<li>Replace SSL assertion with explicit record length check.</li>
<li>Fix NPE when upgrade message fails to aggregate.</li>
<li>SslHandler: Fix possible NPE when executor is used for delegating.</li>
<li>Consistently add channel info in HTTP/2 logs.</li>
<li>Add QueryStringDecoder option to leave &#x27;+&#x27; alone.</li>
<li>
<p>Use initialized BouncyCastle providers when available.</p>
</li>
<li>
<p>Fix pom.xml errors that will be fatal with Maven 4</p>
</li>
</ul>



    

    <h2>Patch Instructions:</h2>
    <p>
        To install this SUSE  update use the SUSE recommended
        installation methods like YaST online_update or "zypper patch".<br/>

        Alternatively you can run the command listed for your product:
    </p>
    <ul class="list-group">
        
            <li class="list-group-item">
                SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5
                
                    
                        <br/>
                        <code>zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-3114=1</code>
                    
                    
                
            </li>
        
            <li class="list-group-item">
                SUSE Linux Enterprise High Performance Computing LTSS 15 SP5
                
                    
                        <br/>
                        <code>zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-3114=1</code>
                    
                    
                
            </li>
        
            <li class="list-group-item">
                SUSE Linux Enterprise Server 15 SP3 LTSS
                
                    
                        <br/>
                        <code>zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2025-3114=1</code>
                    
                    
                
            </li>
        
            <li class="list-group-item">
                SUSE Linux Enterprise Server 15 SP4 LTSS
                
                    
                        <br/>
                        <code>zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-3114=1</code>
                    
                    
                
            </li>
        
            <li class="list-group-item">
                SUSE Linux Enterprise Server 15 SP5 LTSS
                
                    
                        <br/>
                        <code>zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-3114=1</code>
                    
                    
                
            </li>
        
            <li class="list-group-item">
                SUSE Linux Enterprise Server for SAP Applications 15 SP3
                
                    
                        <br/>
                        <code>zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2025-3114=1</code>
                    
                    
                
            </li>
        
            <li class="list-group-item">
                SUSE Linux Enterprise Server for SAP Applications 15 SP4
                
                    
                        <br/>
                        <code>zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2025-3114=1</code>
                    
                    
                
            </li>
        
            <li class="list-group-item">
                SUSE Linux Enterprise Server for SAP Applications 15 SP5
                
                    
                        <br/>
                        <code>zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2025-3114=1</code>
                    
                    
                
            </li>
        
            <li class="list-group-item">
                SUSE Enterprise Storage 7.1
                
                    
                        <br/>
                        <code>zypper in -t patch SUSE-Storage-7.1-2025-3114=1</code>
                    
                    
                
            </li>
        
            <li class="list-group-item">
                openSUSE Leap 15.6
                
                    
                        <br/>
                        <code>zypper in -t patch openSUSE-SLE-15.6-2025-3114=1</code>
                    
                    
                
            </li>
        
            <li class="list-group-item">
                Development Tools Module 15-SP6
                
                    
                        <br/>
                        <code>zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP6-2025-3114=1</code>
                    
                    
                
            </li>
        
            <li class="list-group-item">
                Development Tools Module 15-SP7
                
                    
                        <br/>
                        <code>zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP7-2025-3114=1</code>
                    
                    
                
            </li>
        
            <li class="list-group-item">
                SUSE Package Hub 15 15-SP6
                
                    
                        <br/>
                        <code>zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2025-3114=1</code>
                    
                    
                
            </li>
        
            <li class="list-group-item">
                SUSE Package Hub 15 15-SP7
                
                    
                        <br/>
                        <code>zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP7-2025-3114=1</code>
                    
                    
                
            </li>
        
            <li class="list-group-item">
                SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
                
                    
                        <br/>
                        <code>zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2025-3114=1</code>
                    
                    
                
            </li>
        
            <li class="list-group-item">
                SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
                
                    
                        <br/>
                        <code>zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-3114=1</code>
                    
                    
                
            </li>
        
            <li class="list-group-item">
                SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
                
                    
                        <br/>
                        <code>zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-3114=1</code>
                    
                    
                
            </li>
        
    </ul>

    <h2>Package List:</h2>
    <ul>
        
            
                <li>
                    SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64 x86_64)
                    <ul>
                        
                            <li>netty-tcnative-2.0.73-150200.3.30.1</li>
                        
                    </ul>
                </li>
            
        
            
                <li>
                    SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64 x86_64)
                    <ul>
                        
                            <li>netty-tcnative-2.0.73-150200.3.30.1</li>
                        
                    </ul>
                </li>
            
        
            
                <li>
                    SUSE Linux Enterprise Server 15 SP3 LTSS (aarch64 ppc64le s390x x86_64)
                    <ul>
                        
                            <li>netty-tcnative-2.0.73-150200.3.30.1</li>
                        
                    </ul>
                </li>
            
        
            
                <li>
                    SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64)
                    <ul>
                        
                            <li>netty-tcnative-2.0.73-150200.3.30.1</li>
                        
                    </ul>
                </li>
            
        
            
                <li>
                    SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64)
                    <ul>
                        
                            <li>netty-tcnative-2.0.73-150200.3.30.1</li>
                        
                    </ul>
                </li>
            
        
            
                <li>
                    SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64)
                    <ul>
                        
                            <li>netty-tcnative-2.0.73-150200.3.30.1</li>
                        
                    </ul>
                </li>
            
        
            
                <li>
                    SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
                    <ul>
                        
                            <li>netty-tcnative-2.0.73-150200.3.30.1</li>
                        
                    </ul>
                </li>
            
        
            
                <li>
                    SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64)
                    <ul>
                        
                            <li>netty-tcnative-2.0.73-150200.3.30.1</li>
                        
                    </ul>
                </li>
            
        
            
                <li>
                    SUSE Enterprise Storage 7.1 (aarch64 x86_64)
                    <ul>
                        
                            <li>netty-tcnative-2.0.73-150200.3.30.1</li>
                        
                    </ul>
                </li>
            
        
            
                <li>
                    openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
                    <ul>
                        
                            <li>netty-4.1.126-150200.4.34.1</li>
                        
                            <li>netty-tcnative-2.0.73-150200.3.30.1</li>
                        
                    </ul>
                </li>
            
                <li>
                    openSUSE Leap 15.6 (noarch)
                    <ul>
                        
                            <li>netty-tcnative-javadoc-2.0.73-150200.3.30.1</li>
                        
                            <li>netty-javadoc-4.1.126-150200.4.34.1</li>
                        
                    </ul>
                </li>
            
        
            
                <li>
                    Development Tools Module 15-SP6 (aarch64 ppc64le s390x x86_64)
                    <ul>
                        
                            <li>netty-tcnative-2.0.73-150200.3.30.1</li>
                        
                    </ul>
                </li>
            
        
            
                <li>
                    Development Tools Module 15-SP7 (aarch64 ppc64le s390x x86_64)
                    <ul>
                        
                            <li>netty-tcnative-debugsource-2.0.73-150200.3.30.1</li>
                        
                            <li>netty-tcnative-2.0.73-150200.3.30.1</li>
                        
                    </ul>
                </li>
            
        
            
                <li>
                    SUSE Package Hub 15 15-SP6 (aarch64 ppc64le s390x x86_64)
                    <ul>
                        
                            <li>netty-4.1.126-150200.4.34.1</li>
                        
                    </ul>
                </li>
            
                <li>
                    SUSE Package Hub 15 15-SP6 (noarch)
                    <ul>
                        
                            <li>netty-javadoc-4.1.126-150200.4.34.1</li>
                        
                    </ul>
                </li>
            
        
            
                <li>
                    SUSE Package Hub 15 15-SP7 (aarch64 ppc64le s390x x86_64)
                    <ul>
                        
                            <li>netty-4.1.126-150200.4.34.1</li>
                        
                    </ul>
                </li>
            
                <li>
                    SUSE Package Hub 15 15-SP7 (noarch)
                    <ul>
                        
                            <li>netty-javadoc-4.1.126-150200.4.34.1</li>
                        
                    </ul>
                </li>
            
        
            
                <li>
                    SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64)
                    <ul>
                        
                            <li>netty-tcnative-2.0.73-150200.3.30.1</li>
                        
                    </ul>
                </li>
            
        
            
                <li>
                    SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64)
                    <ul>
                        
                            <li>netty-tcnative-2.0.73-150200.3.30.1</li>
                        
                    </ul>
                </li>
            
        
            
                <li>
                    SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64)
                    <ul>
                        
                            <li>netty-tcnative-2.0.73-150200.3.30.1</li>
                        
                    </ul>
                </li>
            
        
    </ul>

    
        <h2>References:</h2>
        <ul>
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2025-55163.html">https://www.suse.com/security/cve/CVE-2025-55163.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2025-58056.html">https://www.suse.com/security/cve/CVE-2025-58056.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2025-58057.html">https://www.suse.com/security/cve/CVE-2025-58057.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1247991">https://bugzilla.suse.com/show_bug.cgi?id=1247991</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1249116">https://bugzilla.suse.com/show_bug.cgi?id=1249116</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1249134">https://bugzilla.suse.com/show_bug.cgi?id=1249134</a>
                    </li>
                
            
        </ul>
    
</div>