Ecosyste.ms: Advisories

An open API service providing security vulnerability metadata for many open source software ecosystems.

Security Advisories: GSA_kwCzR0hTQS1ncmc0LXdmMjktcjl2ds0Vrg

Bzip2Decoder doesn't allow setting size restrictions for decompressed data

Impact

The Bzip2 decompression decoder function doesn't allow setting size restrictions on the decompressed output data (which affects the allocation size used during decompression).

All users of Bzip2Decoder are affected. The malicious input can trigger an OOME and so a DoS attack

Workarounds

No workarounds other than not using the Bzip2Decoder

References

Relevant code areas:

https://github.com/netty/netty/blob/netty-4.1.67.Final/codec/src/main/java/io/netty/handler/codec/compression/Bzip2Decoder.java#L80
https://github.com/netty/netty/blob/netty-4.1.67.Final/codec/src/main/java/io/netty/handler/codec/compression/Bzip2Decoder.java#L294
https://github.com/netty/netty/blob/netty-4.1.67.Final/codec/src/main/java/io/netty/handler/codec/compression/Bzip2Decoder.java#L305

Permalink: https://github.com/advisories/GHSA-grg4-wf29-r9vv
JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS1ncmc0LXdmMjktcjl2ds0Vrg
Source: GitHub Advisory Database
Origin: Unspecified
Severity: High
Classification: General
Published: about 3 years ago
Updated: over 1 year ago


CVSS Score: 7.5
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Identifiers: GHSA-grg4-wf29-r9vv, CVE-2021-37136
References: Repository: https://github.com/netty/netty
Blast Radius: 31.2

Affected Packages

maven:io.netty:netty
Dependent packages: 1,133
Dependent repositories: 14,650
Downloads:
Affected Version Ranges: < 4.0.0
No known fixed version
All affected versions:
maven:org.jboss.netty:netty
Dependent packages: 324
Dependent repositories: 1,820
Downloads:
Affected Version Ranges: < 4.0.0
No known fixed version
All affected versions:
maven:io.netty:netty-codec
Dependent packages: 1,302
Dependent repositories: 4,698
Downloads:
Affected Version Ranges: < 4.1.68.Final
Fixed in: 4.1.68.Final
All affected versions: 4.1.6-0.Final, 4.1.6-1.Final, 4.1.6-2.Final, 4.1.6-3.Final, 4.1.6-4.Final, 4.1.6-5.Final, 4.1.6-6.Final, 4.1.6-7.Final
All unaffected versions: