| Name | CVE-2021-22569 |
| Description | An issue in protobuf-java allowed the interleaving of com.google.protobuf.UnknownFieldSet fields in such a way that would be processed out of order. A small malicious payload can occupy the parser for several minutes by creating large numbers of short-lived objects that cause frequent, repeated pauses. We recommend upgrading libraries beyond the vulnerable versions. |
| Source | CVE (at NVD; CERT, ENISA, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
| References | DLA-3393-1 |
The table below lists information on source packages.
| Source Package | Release | Version | Status |
|---|---|---|---|
| protobuf (PTS) | bullseye | 3.12.4-1+deb11u1 | fixed |
| bookworm | 3.21.12-3 | fixed | |
| trixie | 3.21.12-11 | fixed | |
| forky, sid | 3.21.12-14 | fixed |
The information below is based on the following data on fixed versions.
| Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
|---|---|---|---|---|---|---|
| protobuf | source | experimental | 3.19.3-1 | |||
| protobuf | source | buster | 3.6.1.3-2+deb10u1 | DLA-3393-1 | ||
| protobuf | source | bullseye | 3.12.4-1+deb11u1 | |||
| protobuf | source | (unstable) | 3.21.9-3 |
[stretch] - protobuf <no-dsa> (Minor issue)
https://www.openwall.com/lists/oss-security/2022/01/12/4
https://cloud.google.com/support/bulletins#gcp-2022-001
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=39330 (unclear, might be bogus)
https://github.com/protocolbuffers/protobuf/pull/9371/commits/5ea2bdf6d7483d64a6b02fcf00ee51fbfb80e847