The Snappy frame decoder function doesn't restrict the chunk length which may lead to excessive memory usage. Beside this it also may buffer reserved skippable chunks until the whole chunk was received which may lead to excessive memory usage as well. This vulnerability can be triggered by supplying malicious input that decompresses to a very big size (via a network stream or a file) or by sending a huge skippable chunk.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
History
21 Nov 2024, 06:14
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/netty/netty/security/advisories/GHSA-9vjp-v76f-g363 - Third Party Advisory | |
References | () https://lists.apache.org/thread.html/r06a145c9bd41a7344da242cef07977b24abe3349161ede948e30913d%40%3Ccommits.druid.apache.org%3E - | |
References | () https://lists.apache.org/thread.html/r5406eaf3b07577d233b9f07cfc8f26e28369e6bab5edfcab41f28abb%40%3Ccommits.druid.apache.org%3E - | |
References | () https://lists.apache.org/thread.html/r5e05eba32476c580412f9fbdfc9b8782d5b40558018ac4ac07192a04%40%3Ccommits.druid.apache.org%3E - | |
References | () https://lists.apache.org/thread.html/r75490c61c2cb7b6ae2c81238fd52ae13636c60435abcd732d41531a0%40%3Ccommits.druid.apache.org%3E - | |
References | () https://lists.apache.org/thread.html/rd262f59b1586a108e320e5c966feeafbb1b8cdc96965debc7cc10b16%40%3Ccommits.druid.apache.org%3E - | |
References | () https://lists.apache.org/thread.html/rfb2bf8597e53364ccab212fbcbb2a4e9f0a9e1429b1dc08023c6868e%40%3Cdev.tinkerpop.apache.org%3E - | |
References | () https://lists.debian.org/debian-lts-announce/2023/01/msg00008.html - Mailing List, Third Party Advisory | |
References | () https://security.netapp.com/advisory/ntap-20220210-0012/ - Third Party Advisory | |
References | () https://www.debian.org/security/2023/dsa-5316 - Third Party Advisory | |
References | () https://www.oracle.com/security-alerts/cpuapr2022.html - Patch, Third Party Advisory | |
References | () https://www.oracle.com/security-alerts/cpujan2022.html - Patch, Third Party Advisory | |
References | () https://www.oracle.com/security-alerts/cpujul2022.html - Patch, Third Party Advisory |
07 Nov 2023, 03:36
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Information
Published : 2021-10-19 15:15
Updated : 2024-11-21 06:14
NVD link : CVE-2021-37137
Mitre link : CVE-2021-37137
CVE.ORG link : CVE-2021-37137
JSON object : View
Products Affected
quarkus
- quarkus
oracle
- communications_brm_-_elastic_charging_engine
- banking_apis
- commerce_guided_search
- communications_diameter_signaling_router
- peoplesoft_enterprise_peopletools
- webcenter_portal
- communications_cloud_native_core_binding_support_function
- banking_digital_experience
netty
- netty
netapp
- oncommand_insight
debian
- debian_linux
CWE
CWE-400
Uncontrolled Resource Consumption