netty-incubator-codec-ohttp is the OHTTP implementation for netty. BoringSSLAEADContext keeps track of how many OHTTP responses have been sent and uses this sequence number to calculate the appropriate nonce to use with the encryption algorithm. Unfortunately, two separate errors combine which would allow an attacker to cause the sequence number to overflow and thus the nonce to repeat.
Advisories
Source ID Title
EUVD EUVD EUVD-2024-2051 netty-incubator-codec-ohttp is the OHTTP implementation for netty. BoringSSLAEADContext keeps track of how many OHTTP responses have been sent and uses this sequence number to calculate the appropriate nonce to use with the encryption algorithm. Unfortunately, two separate errors combine which would allow an attacker to cause the sequence number to overflow and thus the nonce to repeat.
Github GHSA Github GHSA GHSA-g762-h86w-8749 BoringSSLAEADContext in Netty Repeats Nonces
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Mon, 14 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00426}

epss

{'score': 0.00471}


Sun, 13 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00098}

epss

{'score': 0.00426}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2024-08-06T18:58:19.539Z

Reserved: 2024-05-20T21:07:48.189Z

Link: CVE-2024-36121

cve-icon Vulnrichment

Updated: 2024-08-02T03:30:12.965Z

cve-icon NVD

Status : Modified

Published: 2024-06-04T22:15:10.490

Modified: 2024-11-21T09:21:39.927

Link: CVE-2024-36121

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.