Name | CVE-2021-37137 |
Description | The Snappy frame decoder function doesn't restrict the chunk length which may lead to excessive memory usage. Beside this it also may buffer reserved skippable chunks until the whole chunk was received which may lead to excessive memory usage as well. This vulnerability can be triggered by supplying malicious input that decompresses to a very big size (via a network stream or a file) or by sending a huge skippable chunk. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
References | DLA-3268-1, DSA-5316-1, ELA-770-1 |
Debian Bugs | 1014769 |
Vulnerable and fixed packages
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|
netty (PTS) | jessie, jessie (lts) | 1:3.2.6.Final-2+deb8u2 | fixed |
| stretch (security) | 1:4.1.7-2+deb9u3 | vulnerable |
| stretch (lts), stretch | 1:4.1.7-2+deb9u5 | fixed |
| buster (security), buster, buster (lts) | 1:4.1.33-1+deb10u5 | fixed |
| bullseye (security), bullseye | 1:4.1.48-4+deb11u2 | fixed |
| bookworm (security), bookworm | 1:4.1.48-7+deb12u1 | fixed |
| sid, trixie | 1:4.1.48-10 | fixed |
netty-3.9 (PTS) | jessie, jessie (lts) | 3.9.0.Final-1+deb8u2 | fixed |
| stretch (security) | 3.9.9.Final-1+deb9u1 | fixed |
| stretch (lts), stretch | 3.9.9.Final-1+deb9u2 | fixed |
The information below is based on the following data on fixed versions.
Notes
[stretch] - netty <no-dsa> (Minor issue)
https://github.com/netty/netty/security/advisories/GHSA-9vjp-v76f-g363
Fixed by: https://github.com/netty/netty/commit/6da4956b31023ae967451e1d94ff51a746a9194f (netty-4.1.68.Final)
[jessie] - netty <not-affected> (Snappy support introduced in v4.0)
- netty-3.9 <not-affected> (Snappy support introduced in v4.0)