forked from DataDog/dd-trace-java
-
Notifications
You must be signed in to change notification settings - Fork 0
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
CVE-2021-37136 (High) detected in netty-codec-4.1.34.Final.jar, netty-codec-4.1.43.Final.jar #226
Labels
Mend: dependency security vulnerability
Security vulnerability detected by WhiteSource
Comments
mend-for-jackfan.us.kg
bot
added
the
Mend: dependency security vulnerability
Security vulnerability detected by WhiteSource
label
Nov 3, 2021
1 task
This was referenced Apr 18, 2022
This was referenced May 15, 2022
1 task
1 task
mend-for-jackfan.us.kg
bot
changed the title
CVE-2021-37136 (High) detected in multiple libraries
CVE-2021-37136 (High) detected in netty-codec-4.1.34.Final.jar, netty-codec-4.1.43.Final.jar
Jun 20, 2023
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Labels
Mend: dependency security vulnerability
Security vulnerability detected by WhiteSource
0 participants
CVE-2021-37136 - High Severity Vulnerability
Vulnerable Libraries - netty-codec-4.1.34.Final.jar, netty-codec-4.1.43.Final.jar
netty-codec-4.1.34.Final.jar
Netty is an asynchronous event-driven network application framework for rapid development of maintainable high performance protocol servers and clients.
Library home page: http://netty.io/
Path to vulnerable library: /home/wss-scanner/.ivy2/cache/io.netty/netty-codec/jars/netty-codec-4.1.34.Final.jar
Dependency Hierarchy:
netty-codec-4.1.43.Final.jar
Netty is an asynchronous event-driven network application framework for rapid development of maintainable high performance protocol servers and clients.
Library home page: https://netty.io/
Path to vulnerable library: /home/wss-scanner/.ivy2/cache/io.netty/netty-codec/jars/netty-codec-4.1.43.Final.jar
Dependency Hierarchy:
Found in HEAD commit: 2819174635979a19573ec0ce8e3e2b63a3848079
Found in base branch: master
Vulnerability Details
The Bzip2 decompression decoder function doesn't allow setting size restrictions on the decompressed output data (which affects the allocation size used during decompression). All users of Bzip2Decoder are affected. The malicious input can trigger an OOME and so a DoS attack
Publish Date: 2021-10-19
URL: CVE-2021-37136
CVSS 3 Score Details (7.5)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Origin: GHSA-grg4-wf29-r9vv
Release Date: 2021-10-19
Fix Resolution (io.netty:netty-codec): 4.1.68.Final
Direct dependency fix Resolution (com.typesafe.play:play-netty-server_2.13): 2.8.16
Fix Resolution (io.netty:netty-codec): 4.1.68.Final
Direct dependency fix Resolution (com.typesafe.play:play-netty-server_2.13): 2.8.16
The text was updated successfully, but these errors were encountered: