CVE-2021-37136
Java vulnerability analysis and mitigation

Overview

CVE-2021-37136 is a vulnerability in the Bzip2 decompression decoder function of Netty, discovered and disclosed in September 2021. The vulnerability affects Netty versions 4.1.0 to 4.1.67 (inclusive), where the decompression decoder function doesn't allow setting size restrictions on the decompressed output data, which affects the allocation size used during decompression (GitHub Advisory).

Technical details

The vulnerability stems from the Bzip2 decoder's behavior of attempting to decompress the entire file before adding it to the output buffer, without implementing size restrictions. This design flaw allows for potential zip bomb attacks, as the decoder continues processing until it reaches the end of the file. The vulnerability has been assigned a CVSS v3.1 base score of 7.5 (HIGH) with the vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H (NVD).

Impact

The vulnerability can be exploited to trigger an Out of Memory Error (OOME), leading to a Denial of Service (DoS) attack. Testing has demonstrated that a maliciously crafted Bzip2 file could cause memory usage of up to 100GB, eventually crashing the process (JFrog Blog).

Mitigation and workarounds

The vulnerability was patched in Netty version 4.1.68. The fix modifies the decoder function to return after processing each chunk, allowing the caller to handle the decompressed data in smaller portions. There are no workarounds for this issue, and users are strongly encouraged to upgrade to version 4.1.68 or later (GitHub Advisory).

Community reactions

Multiple organizations and vendors have responded to this vulnerability by issuing security advisories and patches, including NetApp, Debian, and Oracle. NetApp released patches for affected products and provided detailed advisories (NetApp Advisory). Debian included fixes in their security updates, addressing the vulnerability across multiple versions (Debian Advisory).

Additional resources


SourceThis report was generated using AI

Related Java vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-65091CRITICAL10
  • JavaJava
  • org.xwiki.contrib:macro-fullcalendar-pom
NoYesJan 10, 2026
CVE-2025-70974CRITICAL10
  • JavaJava
  • com.alibaba:fastjson
NoYesJan 09, 2026
CVE-2026-22244HIGH8.5
  • JavaJava
  • org.open-metadata:platform
NoYesJan 08, 2026
CVE-2025-65090MEDIUM5.3
  • JavaJava
  • org.xwiki.contrib:macro-fullcalendar-pom
NoYesJan 10, 2026
CVE-2026-0707MEDIUM5.3
  • JavaJava
  • org.keycloak:keycloak-parent
NoNoJan 08, 2026

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management