Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[Improve][CVE] snappy-java's missing upper bound check on chunk length can lead to Denial of Service (DoS) impact #9046

Closed
2 tasks done
dockerzhang opened this issue Oct 12, 2023 · 0 comments · Fixed by #9047 or #9049
Assignees
Labels
Milestone

Comments

@dockerzhang
Copy link
Contributor

dockerzhang commented Oct 12, 2023

Description

snappy-java is a data compression library in Java. Its SnappyInputStream was found to be vulnerable to Denial of Service (DoS) attacks when decompressing data with a too-large chunk size. Due to missing upper bound check on chunk length, an unrecoverable fatal error can occur.

Affected versions: <= 1.1.10.3
Patched version: 1.1.10.4

InLong Component

Other for not specified component

Are you willing to submit PR?

  • Yes, I am willing to submit a PR!

Code of Conduct

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment