The Snappy frame decoder function doesn't restrict the chunk length which may lead to excessive memory usage. Beside this it also may buffer reserved skippable chunks until the whole chunk was received which may lead to excessive memory usage as well. This vulnerability can be triggered by supplying malicious input that decompresses to a very big size (via a network stream or a file) or by sending a huge skippable chunk.

Project Subscriptions

Vendors Products
Debian Linux Subscribe
Oncommand Insight Subscribe
Banking Apis Subscribe
Banking Digital Experience Subscribe
Commerce Guided Search Subscribe
Communications Brm - Elastic Charging Engine Subscribe
Communications Cloud Native Core Binding Support Function Subscribe
Communications Diameter Signaling Router Subscribe
Peoplesoft Enterprise Peopletools Subscribe
Webcenter Portal Subscribe
Quarkus Subscribe
Quarkus Subscribe
Amq Broker Subscribe
Amq Streams Subscribe
Camel Quarkus Subscribe
Jboss Data Grid Subscribe
Jboss Enterprise Application Platform Subscribe
Jboss Enterprise Application Platform Eus Subscribe
Jboss Enterprise Bpms Platform Subscribe
Jboss Fuse Subscribe
Logging Subscribe
Openshift Application Runtimes Subscribe
Satellite Subscribe
Service Registry Subscribe
Advisories
Source ID Title
Debian DLA Debian DLA DLA-3268-1 netty security update
Debian DSA Debian DSA DSA-5316-1 netty security update
EUVD EUVD EUVD-2021-2029 The Snappy frame decoder function doesn't restrict the chunk length which may lead to excessive memory usage. Beside this it also may buffer reserved skippable chunks until the whole chunk was received which may lead to excessive memory usage as well. This vulnerability can be triggered by supplying malicious input that decompresses to a very big size (via a network stream or a file) or by sending a huge skippable chunk.
Github GHSA Github GHSA GHSA-9vjp-v76f-g363 SnappyFrameDecoder doesn't restrict chunk length any may buffer skippable chunks in an unnecessary way
Ubuntu USN Ubuntu USN USN-6049-1 Netty vulnerabilities
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 25 Jun 2025 14:00:00 +0000

Type Values Removed Values Added
First Time appeared Redhat jboss Enterprise Application Platform Eus
CPEs cpe:/a:redhat:jboss_enterprise_application_platform_eus:7.1::el7
cpe:/a:redhat:jboss_enterprise_application_platform_eus:7.3::el7
Vendors & Products Redhat jboss Enterprise Application Platform Eus

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: JFROG

Published:

Updated: 2024-08-04T01:16:02.953Z

Reserved: 2021-07-20T00:00:00

Link: CVE-2021-37137

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2021-10-19T15:15:07.757

Modified: 2024-11-21T06:14:43.073

Link: CVE-2021-37137

cve-icon Redhat

Severity : Moderate

Publid Date: 2021-09-09T00:00:00Z

Links: CVE-2021-37137 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses