The Snappy frame decoder function doesn't restrict the chunk length which may lead to excessive memory usage. Beside this it also may buffer reserved skippable chunks until the whole chunk was received which may lead to excessive memory usage as well. This vulnerability can be triggered by supplying malicious input that decompresses to a very big size (via a network stream or a file) or by sending a huge skippable chunk. Reference: https://github.com/netty/netty/security/advisories/GHSA-9vjp-v76f-g363
Marking Red Hat AMQ Broker 7 as having a low impact, this is because although a vulnerable version of netty is used it does not use Snappy (aka. Zippy) compression/decompression.
Marking Fuse 6 as OOSS and adjusting Fuse 7 to Low Impact. Netty-codec vulnerable version is present but no use of Snappy compression/decompression.
Marking c.r.c|Insights|MAS affected/ooss. Vulnerable code is present but appears unused.
Reducing Satellite's severity to Low as flaw doesn't affect product directly in code as it does not make use of netty-codec's SnappyFrameDecoder.
Marking Red Hat AMQ Streams, Red Hat Integration Camel K, Red Hat Integration Camel Quarkus as having a low impact, this is because a vulnerable version of netty is distributed in these products and used but the vulnerable Snappy (aka Zippy) decoder is not used.
Marking Red Hat Service Registry 1 & 2 as having a low impact, this is because a vulnerable version of netty is distributed in these products and used but the vulnerable Snappy (aka Zippy) decoder is not used.
Upstream commit: https://github.com/netty/netty/commit/6da4956b31023ae967451e1d94ff51a746a9194f
Marking Quarkus as having a low impact, this is because a vulnerable version of netty is distributed in these products and used but the vulnerable Snappy (aka Zippy) decoder is not used.
This issue has been addressed in the following products: Vert.x 4.1.5 Via RHSA-2021:3959 https://access.redhat.com/errata/RHSA-2021:3959
This issue has been addressed in the following products: Red Hat AMQ 7.9.1 Via RHSA-2021:4851 https://access.redhat.com/errata/RHSA-2021:4851
This issue has been addressed in the following products: OpenShift Logging 5.3 Via RHSA-2021:5129 https://access.redhat.com/errata/RHSA-2021:5129
This issue has been addressed in the following products: OpenShift Logging 5.1 Via RHSA-2021:5128 https://access.redhat.com/errata/RHSA-2021:5128
This issue has been addressed in the following products: OpenShift Logging 5.2 Via RHSA-2021:5127 https://access.redhat.com/errata/RHSA-2021:5127
This issue has been addressed in the following products: Red Hat Fuse 7.10 Via RHSA-2021:5134 https://access.redhat.com/errata/RHSA-2021:5134
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2021-37137
This issue has been addressed in the following products: Red Hat AMQ Streams 2.0.0 Via RHSA-2022:0138 https://access.redhat.com/errata/RHSA-2022:0138
This issue has been addressed in the following products: Red Hat Data Grid 8.3.0 Via RHSA-2022:0520 https://access.redhat.com/errata/RHSA-2022:0520
This issue has been addressed in the following products: Red Hat build of Quarkus 2.2.5 Via RHSA-2022:0589 https://access.redhat.com/errata/RHSA-2022:0589
This issue has been addressed in the following products: RHINT Camel-Q 2.2.1 Via RHSA-2022:1013 https://access.redhat.com/errata/RHSA-2022:1013
This issue has been addressed in the following products: Red Hat OpenShift Logging 5.4 Via RHSA-2022:2216 https://access.redhat.com/errata/RHSA-2022:2216
This issue has been addressed in the following products: OpenShift Logging 5.2 Via RHSA-2022:2218 https://access.redhat.com/errata/RHSA-2022:2218
This issue has been addressed in the following products: OpenShift Logging 5.3 Via RHSA-2022:2217 https://access.redhat.com/errata/RHSA-2022:2217
This issue has been addressed in the following products: Red Hat JBoss Enterprise Application Platform Via RHSA-2022:4922 https://access.redhat.com/errata/RHSA-2022:4922
This issue has been addressed in the following products: Red Hat JBoss Enterprise Application Platform 7.4 on RHEL 7 Via RHSA-2022:4918 https://access.redhat.com/errata/RHSA-2022:4918
This issue has been addressed in the following products: Red Hat JBoss Enterprise Application Platform 7.4 for RHEL 8 Via RHSA-2022:4919 https://access.redhat.com/errata/RHSA-2022:4919
This issue has been addressed in the following products: RHPAM 7.13.0 async Via RHSA-2022:5903 https://access.redhat.com/errata/RHSA-2022:5903
This issue has been addressed in the following products: RHINT Service Registry 2.3.0 GA Via RHSA-2022:6835 https://access.redhat.com/errata/RHSA-2022:6835
This issue has been addressed in the following products: Red Hat Satellite 6.12 for RHEL 8 Via RHSA-2022:8506 https://access.redhat.com/errata/RHSA-2022:8506
This issue has been addressed in the following products: Red Hat AMQ Streams 2.4.0 Via RHSA-2023:3223 https://access.redhat.com/errata/RHSA-2023:3223
This issue has been addressed in the following products: Red Hat AMQ Streams 2.5.0 Via RHSA-2023:5165 https://access.redhat.com/errata/RHSA-2023:5165