The Snappy frame decoder function doesn't restrict the chunk length which may lead to excessive memory usage. Beside this it also may buffer reserved skippable chunks until the whole chunk was received which may lead to excessive memory usage as well. This vulnerability can be triggered by supplying malicious input that decompresses to a very big size (via a network stream or a file) or by sending a huge skippable chunk.
https://github.com/netty/netty/security/advisories/GHSA-9vjp-v76f-g363
https://lists.apache.org/thread.html/[email protected]%3Cdev.tinkerpop.apache.org%3E
https://lists.apache.org/thread.html/[email protected]%3Ccommits.druid.apache.org%3E
https://lists.apache.org/thread.html/[email protected]%3Ccommits.druid.apache.org%3E
https://lists.apache.org/thread.html/[email protected]%3Ccommits.druid.apache.org%3E
https://lists.apache.org/thread.html/[email protected]%3Ccommits.druid.apache.org%3E
https://lists.apache.org/thread.html/[email protected]%3Ccommits.druid.apache.org%3E
https://www.oracle.com/security-alerts/cpujan2022.html
https://security.netapp.com/advisory/ntap-20220210-0012/
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujul2022.html
https://lists.debian.org/debian-lts-announce/2023/01/msg00008.html
Source: MITRE
Published: 2021-10-19
Updated: 2023-02-24
Type: CWE-400
Base Score: 5
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P
Impact Score: 2.9
Exploitability Score: 10
Severity: MEDIUM
Base Score: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Impact Score: 3.6
Exploitability Score: 3.9
Severity: HIGH