The Snappy frame decoder function doesn't restrict the chunk length which may lead to excessive memory usage. Beside this it also may buffer reserved skippable chunks until the whole chunk was received which may lead to excessive memory usage as well. This vulnerability can be triggered by supplying malicious input that decompresses to a very big size (via a network stream or a file) or by sending a huge skippable chunk.
Project Subscriptions
| Vendors | Products |
|---|---|
|
Debian
Subscribe
|
Debian Linux
Subscribe
|
|
Netapp
Subscribe
|
Oncommand Insight
Subscribe
|
|
Netty
Subscribe
|
Netty
Subscribe
|
|
Oracle
Subscribe
|
Banking Apis
Subscribe
Banking Digital Experience
Subscribe
Commerce Guided Search
Subscribe
Communications Brm - Elastic Charging Engine
Subscribe
Communications Cloud Native Core Binding Support Function
Subscribe
Communications Diameter Signaling Router
Subscribe
Peoplesoft Enterprise Peopletools
Subscribe
Webcenter Portal
Subscribe
|
|
Quarkus
Subscribe
|
Quarkus
Subscribe
|
|
Redhat
Subscribe
|
Amq Broker
Subscribe
Amq Streams
Subscribe
Camel Quarkus
Subscribe
Jboss Data Grid
Subscribe
Jboss Enterprise Application Platform
Subscribe
Jboss Enterprise Application Platform Eus
Subscribe
Jboss Enterprise Bpms Platform
Subscribe
Jboss Fuse
Subscribe
Logging
Subscribe
Openshift Application Runtimes
Subscribe
Satellite
Subscribe
Service Registry
Subscribe
|
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-3268-1 | netty security update |
Debian DSA |
DSA-5316-1 | netty security update |
EUVD |
EUVD-2021-2029 | The Snappy frame decoder function doesn't restrict the chunk length which may lead to excessive memory usage. Beside this it also may buffer reserved skippable chunks until the whole chunk was received which may lead to excessive memory usage as well. This vulnerability can be triggered by supplying malicious input that decompresses to a very big size (via a network stream or a file) or by sending a huge skippable chunk. |
Github GHSA |
GHSA-9vjp-v76f-g363 | SnappyFrameDecoder doesn't restrict chunk length any may buffer skippable chunks in an unnecessary way |
Ubuntu USN |
USN-6049-1 | Netty vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Wed, 25 Jun 2025 14:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Redhat jboss Enterprise Application Platform Eus
|
|
| CPEs | cpe:/a:redhat:jboss_enterprise_application_platform_eus:7.1::el7 cpe:/a:redhat:jboss_enterprise_application_platform_eus:7.3::el7 |
|
| Vendors & Products |
Redhat jboss Enterprise Application Platform Eus
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: JFROG
Published:
Updated: 2024-08-04T01:16:02.953Z
Reserved: 2021-07-20T00:00:00
Link: CVE-2021-37137
No data.
Status : Modified
Published: 2021-10-19T15:15:07.757
Modified: 2024-11-21T06:14:43.073
Link: CVE-2021-37137
OpenCVE Enrichment
No data.
Weaknesses
Debian DLA
Debian DSA
EUVD
Github GHSA
Ubuntu USN