Bug 2004135 (CVE-2021-37137) - CVE-2021-37137 netty-codec: SnappyFrameDecoder doesn't restrict chunk length and may buffer skippable chunks in an unnecessary way
Summary: CVE-2021-37137 netty-codec: SnappyFrameDecoder doesn't restrict chunk length ...
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2021-37137
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 2006304 2012254
Blocks: 2004097
TreeView+ depends on / blocked
 
Reported: 2021-09-14 14:41 UTC by Guilherme de Almeida Suckevicz
Modified: 2023-09-14 09:52 UTC (History)
118 users (show)

Fixed In Version: netty-4.1.68.Final
Doc Type: If docs needed, set a value
Doc Text:
A flaw was found in the Netty's netty-codec due to unrestricted chunk lengths in the SnappyFrameDecoder. By sending a specially-crafted input, a remote attacker could cause excessive memory usage resulting in a denial of service.
Clone Of:
Environment:
Last Closed: 2021-12-14 22:34:45 UTC
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2021:3959 0 None None None 2021-11-10 16:41:07 UTC
Red Hat Product Errata RHSA-2021:4851 0 None None None 2021-11-30 08:44:44 UTC
Red Hat Product Errata RHSA-2021:5127 0 None None None 2021-12-14 18:40:47 UTC
Red Hat Product Errata RHSA-2021:5128 0 None None None 2021-12-14 18:11:03 UTC
Red Hat Product Errata RHSA-2021:5129 0 None None None 2021-12-14 17:08:10 UTC
Red Hat Product Errata RHSA-2021:5134 0 None None None 2021-12-14 21:36:10 UTC
Red Hat Product Errata RHSA-2022:0138 0 None None None 2022-01-13 15:33:35 UTC
Red Hat Product Errata RHSA-2022:0520 0 None None None 2022-02-14 13:08:10 UTC
Red Hat Product Errata RHSA-2022:0589 0 None None None 2022-02-21 18:23:16 UTC
Red Hat Product Errata RHSA-2022:1013 0 None None None 2022-03-22 15:34:42 UTC
Red Hat Product Errata RHSA-2022:2216 0 None None None 2022-05-11 18:50:29 UTC
Red Hat Product Errata RHSA-2022:2217 0 None None None 2022-05-11 20:33:26 UTC
Red Hat Product Errata RHSA-2022:2218 0 None None None 2022-05-11 19:52:07 UTC
Red Hat Product Errata RHSA-2022:4918 0 None None None 2022-06-06 15:51:59 UTC
Red Hat Product Errata RHSA-2022:4919 0 None None None 2022-06-06 15:58:24 UTC
Red Hat Product Errata RHSA-2022:4922 0 None None None 2022-06-06 15:11:47 UTC
Red Hat Product Errata RHSA-2022:5903 0 None None None 2022-08-04 04:47:25 UTC
Red Hat Product Errata RHSA-2022:6835 0 None None None 2022-10-06 12:26:39 UTC
Red Hat Product Errata RHSA-2022:8506 0 None None None 2022-11-16 13:32:08 UTC
Red Hat Product Errata RHSA-2023:3223 0 None None None 2023-05-18 09:54:12 UTC
Red Hat Product Errata RHSA-2023:5165 0 None None None 2023-09-14 09:52:06 UTC

Description Guilherme de Almeida Suckevicz 2021-09-14 14:41:31 UTC
The Snappy frame decoder function doesn't restrict the chunk length which may lead to excessive memory usage. Beside this it also may buffer reserved skippable chunks until the whole chunk was received which may lead to excessive memory usage as well. This vulnerability can be triggered by supplying malicious input that decompresses to a very big size (via a network stream or a file) or by sending a huge skippable chunk.

Reference:
https://github.com/netty/netty/security/advisories/GHSA-9vjp-v76f-g363

Comment 1 Jonathan Christison 2021-09-14 17:04:03 UTC
Marking Red Hat AMQ Broker 7 as having a low impact, this is because although a vulnerable version of netty is used it does not use Snappy (aka. Zippy) compression/decompression.

Comment 3 Patrick Del Bello 2021-09-16 13:44:49 UTC
Marking Fuse 6 as OOSS and adjusting Fuse 7 to Low Impact. Netty-codec vulnerable version is present but no use of Snappy compression/decompression.

Comment 5 juneau 2021-09-16 15:45:28 UTC
Marking c.r.c|Insights|MAS affected/ooss. Vulnerable code is present but appears unused.

Comment 6 Yadnyawalk Tale 2021-09-21 13:18:22 UTC
Reducing Satellite's severity to Low as flaw doesn't affect product directly in code as it does not make use of netty-codec's SnappyFrameDecoder.

Comment 10 Jonathan Christison 2021-10-08 15:32:02 UTC
Marking Red Hat AMQ Streams, Red Hat Integration Camel K, Red Hat Integration Camel Quarkus as having a low impact, this is because a vulnerable version of netty is distributed in these products and used but the vulnerable Snappy (aka Zippy) decoder is not used.

Comment 12 Jonathan Christison 2021-10-08 15:55:02 UTC
Marking Red Hat Service Registry 1 & 2 as having a low impact, this is because a vulnerable version of netty is distributed in these products and used but the vulnerable Snappy (aka Zippy) decoder is not used.

Comment 17 Jonathan Christison 2021-10-12 15:36:36 UTC
Marking Quarkus as having a low impact, this is because a vulnerable version of netty is distributed in these products and used but the vulnerable Snappy (aka Zippy) decoder is not used.

Comment 20 errata-xmlrpc 2021-11-10 16:41:02 UTC
This issue has been addressed in the following products:

  Vert.x 4.1.5

Via RHSA-2021:3959 https://access.redhat.com/errata/RHSA-2021:3959

Comment 21 errata-xmlrpc 2021-11-30 08:44:39 UTC
This issue has been addressed in the following products:

  Red Hat AMQ 7.9.1

Via RHSA-2021:4851 https://access.redhat.com/errata/RHSA-2021:4851

Comment 24 errata-xmlrpc 2021-12-14 17:08:05 UTC
This issue has been addressed in the following products:

  OpenShift Logging 5.3

Via RHSA-2021:5129 https://access.redhat.com/errata/RHSA-2021:5129

Comment 25 errata-xmlrpc 2021-12-14 18:11:00 UTC
This issue has been addressed in the following products:

  OpenShift Logging 5.1

Via RHSA-2021:5128 https://access.redhat.com/errata/RHSA-2021:5128

Comment 26 errata-xmlrpc 2021-12-14 18:40:42 UTC
This issue has been addressed in the following products:

  OpenShift Logging 5.2

Via RHSA-2021:5127 https://access.redhat.com/errata/RHSA-2021:5127

Comment 27 errata-xmlrpc 2021-12-14 21:36:05 UTC
This issue has been addressed in the following products:

  Red Hat Fuse 7.10

Via RHSA-2021:5134 https://access.redhat.com/errata/RHSA-2021:5134

Comment 28 Product Security DevOps Team 2021-12-14 22:34:39 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2021-37137

Comment 29 errata-xmlrpc 2022-01-13 15:33:30 UTC
This issue has been addressed in the following products:

  Red Hat AMQ Streams 2.0.0

Via RHSA-2022:0138 https://access.redhat.com/errata/RHSA-2022:0138

Comment 30 errata-xmlrpc 2022-02-14 13:08:05 UTC
This issue has been addressed in the following products:

  Red Hat Data Grid 8.3.0

Via RHSA-2022:0520 https://access.redhat.com/errata/RHSA-2022:0520

Comment 31 errata-xmlrpc 2022-02-21 18:23:12 UTC
This issue has been addressed in the following products:

  Red Hat build of Quarkus 2.2.5

Via RHSA-2022:0589 https://access.redhat.com/errata/RHSA-2022:0589

Comment 32 errata-xmlrpc 2022-03-22 15:34:37 UTC
This issue has been addressed in the following products:

  RHINT Camel-Q 2.2.1

Via RHSA-2022:1013 https://access.redhat.com/errata/RHSA-2022:1013

Comment 35 errata-xmlrpc 2022-05-11 18:50:22 UTC
This issue has been addressed in the following products:

  Red Hat OpenShift Logging 5.4

Via RHSA-2022:2216 https://access.redhat.com/errata/RHSA-2022:2216

Comment 36 errata-xmlrpc 2022-05-11 19:52:02 UTC
This issue has been addressed in the following products:

  OpenShift Logging 5.2

Via RHSA-2022:2218 https://access.redhat.com/errata/RHSA-2022:2218

Comment 37 errata-xmlrpc 2022-05-11 20:33:21 UTC
This issue has been addressed in the following products:

  OpenShift Logging 5.3

Via RHSA-2022:2217 https://access.redhat.com/errata/RHSA-2022:2217

Comment 38 errata-xmlrpc 2022-06-06 15:11:41 UTC
This issue has been addressed in the following products:

  Red Hat JBoss Enterprise Application Platform

Via RHSA-2022:4922 https://access.redhat.com/errata/RHSA-2022:4922

Comment 39 errata-xmlrpc 2022-06-06 15:51:54 UTC
This issue has been addressed in the following products:

  Red Hat JBoss Enterprise Application Platform 7.4 on RHEL 7

Via RHSA-2022:4918 https://access.redhat.com/errata/RHSA-2022:4918

Comment 40 errata-xmlrpc 2022-06-06 15:58:18 UTC
This issue has been addressed in the following products:

  Red Hat JBoss Enterprise Application Platform 7.4 for RHEL 8

Via RHSA-2022:4919 https://access.redhat.com/errata/RHSA-2022:4919

Comment 41 errata-xmlrpc 2022-08-04 04:47:19 UTC
This issue has been addressed in the following products:

  RHPAM 7.13.0 async

Via RHSA-2022:5903 https://access.redhat.com/errata/RHSA-2022:5903

Comment 42 errata-xmlrpc 2022-10-06 12:26:34 UTC
This issue has been addressed in the following products:

  RHINT Service Registry 2.3.0 GA

Via RHSA-2022:6835 https://access.redhat.com/errata/RHSA-2022:6835

Comment 43 errata-xmlrpc 2022-11-16 13:32:03 UTC
This issue has been addressed in the following products:

  Red Hat Satellite 6.12 for RHEL 8

Via RHSA-2022:8506 https://access.redhat.com/errata/RHSA-2022:8506

Comment 44 errata-xmlrpc 2023-05-18 09:54:07 UTC
This issue has been addressed in the following products:

  Red Hat AMQ Streams 2.4.0

Via RHSA-2023:3223 https://access.redhat.com/errata/RHSA-2023:3223

Comment 45 errata-xmlrpc 2023-09-14 09:52:01 UTC
This issue has been addressed in the following products:

  Red Hat AMQ Streams 2.5.0

Via RHSA-2023:5165 https://access.redhat.com/errata/RHSA-2023:5165


Note You need to log in before you can comment on or make changes to this bug.