io.netty:netty-codec-http2@4.1.32.Final vulnerabilities

  • latest version

    4.2.6.Final

  • latest non vulnerable version

  • first published

    10 years ago

  • latest version published

    1 months ago

  • licenses detected

  • package registry

  • Direct Vulnerabilities

    Known vulnerabilities in the io.netty:netty-codec-http2 package. This does not include vulnerabilities belonging to this package’s dependencies.

    How to fix?

    Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

    Fix for free
    VulnerabilityVulnerable Version
    • H
    Improper Handling of Highly Compressed Data (Data Amplification)

    io.netty:netty-codec-http2 is a HTTP2 sub package for the netty library, an event-driven asynchronous network application framework.

    Affected versions of this package are vulnerable to Improper Handling of Highly Compressed Data (Data Amplification) via the BrotliDecoder.decompress function, which has no limit on how often it calls pull, decompressing data 64K bytes at a time. An attacker can exhaust system memory and cause application downtime by submitting specially crafted compressed input that triggers excessive buffer allocations.

    How to fix Improper Handling of Highly Compressed Data (Data Amplification)?

    Upgrade io.netty:netty-codec-http2 to version 4.1.125.Final or higher.

    [,4.1.125.Final)
    • H
    Allocation of Resources Without Limits or Throttling

    io.netty:netty-codec-http2 is a HTTP2 sub package for the netty library, an event-driven asynchronous network application framework.

    Affected versions of this package are vulnerable to Allocation of Resources Without Limits or Throttling through the improper handling of concurrently active streams per connection. An attacker can cause resource exhaustion and disrupt service availability by rapidly sending crafted frames, such as WINDOW_UPDATE, HEADERS, or PRIORITY, that manipulate the server's stream reset logic, leading to unbounded concurrent stream processing.

    How to fix Allocation of Resources Without Limits or Throttling?

    Upgrade io.netty:netty-codec-http2 to version 4.1.124.Final, 4.2.4.Final or higher.

    [,4.1.124.Final)[4.2.0.Alpha1,4.2.4.Final)
    • H
    Denial of Service (DoS)

    io.netty:netty-codec-http2 is a HTTP2 sub package for the netty library, an event-driven asynchronous network application framework.

    Affected versions of this package are vulnerable to Denial of Service (DoS) in the implementation of the HTTP/2 protocol. An attacker can cause a denial of service (including via DDoS) by rapidly resetting many streams through request cancellation.

    How to fix Denial of Service (DoS)?

    Upgrade io.netty:netty-codec-http2 to version 4.1.100.Final or higher.

    [,4.1.100.Final)
    • M
    HTTP Request Smuggling

    io.netty:netty-codec-http2 is a HTTP2 sub package for the netty library, an event-driven asynchronous network application framework.

    Affected versions of this package are vulnerable to HTTP Request Smuggling. The content-length header is not correctly validated if the request only uses a single Http2HeaderFrame with the endStream set to true. This could lead to request smuggling if the request is proxied to a remote peer and translated to HTTP/1.1. This is a follow-up of CVE-2021-21295 which did not fix this specific case.

    How to fix HTTP Request Smuggling?

    Upgrade io.netty:netty-codec-http2 to version 4.1.61.Final or higher.

    [,4.1.61.Final)
    • M
    HTTP Request Smuggling

    io.netty:netty-codec-http2 is a HTTP2 sub package for the netty library, an event-driven asynchronous network application framework.

    Affected versions of this package are vulnerable to HTTP Request Smuggling. If a Content-Length header is present in the original HTTP/2 request, the field is not validated by Http2MultiplexHandler as it is propagated up.

    An additional case of this vulnerability was fixed in 4.1.61.Final (CVE-2021-21409).

    How to fix HTTP Request Smuggling?

    Upgrade io.netty:netty-codec-http2 to version 4.1.60.Final or higher.

    [,4.1.60.Final)
    • M
    Denial of Service (DoS)

    io.netty:netty-codec-http2 is a HTTP2 sub package for the netty library, an event-driven asynchronous network application framework.

    Affected versions of this package are vulnerable to Denial of Service (DoS). A Netty based HTTP/2 server could be forced to consume substantial CPU resources by sending it an unbounded sequence of empty DATA frames that do not have END_STREAM set on them.

    How to fix Denial of Service (DoS)?

    Upgrade io.netty:netty-codec-http2 to version 4.1.39.Final or higher.

    [,4.1.39.Final)
    • M
    Denial of Service (DoS)

    io.netty:netty-codec-http2 is a HTTP2 sub package for the netty library, an event-driven asynchronous network application framework.

    Affected versions of this package are vulnerable to Denial of Service (DoS). A Netty based HTTP/2 server can be forced to buffer unbounded amounts of memory when flooded with control frames that require an automatic response.

    How to fix Denial of Service (DoS)?

    Upgrade io.netty:netty-codec-http2 to version 4.1.39.Final or higher.

    [,4.1.39.Final)
    • M
    Denial of Service (DoS)

    io.netty:netty-codec-http2 is a HTTP2 sub package for the netty library, an event-driven asynchronous network application framework.

    Affected versions of this package are vulnerable to Denial of Service (DoS). A Netty based HTTP/2 server can be forced to buffer unbounded amounts of memory when flooded with control frames that require an automatic response.

    How to fix Denial of Service (DoS)?

    Upgrade io.netty:netty-codec-http2 to version 4.1.39.Final or higher.

    [,4.1.39.Final)
    • M
    Denial of Service (DoS)

    io.netty:netty-codec-http2 is a HTTP2 sub package for the netty library, an event-driven asynchronous network application framework.

    Affected versions of this package are vulnerable to Denial of Service (DoS). A Netty based HTTP/2 server can be forced to buffer unbounded amounts of memory when flooded with control frames that require an automatic response.

    How to fix Denial of Service (DoS)?

    Upgrade io.netty:netty-codec-http2 to version 4.1.39.Final or higher.

    [,4.1.39.Final)