Name | CVE-2021-22569 |
Description | An issue in protobuf-java allowed the interleaving of com.google.protobuf.UnknownFieldSet fields in such a way that would be processed out of order. A small malicious payload can occupy the parser for several minutes by creating large numbers of short-lived objects that cause frequent, repeated pauses. We recommend upgrading libraries beyond the vulnerable versions. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub advisories/code/issues, web search, more) |
References | DLA-3393-1 |
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|---|---|---|
protobuf (PTS) | buster | 3.6.1.3-2 | vulnerable |
buster (security) | 3.6.1.3-2+deb10u1 | fixed | |
bullseye | 3.12.4-1 | vulnerable | |
bookworm, sid | 3.21.12-3 | fixed |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|---|---|---|---|---|---|
protobuf | source | experimental | 3.19.3-1 | |||
protobuf | source | buster | 3.6.1.3-2+deb10u1 | DLA-3393-1 | ||
protobuf | source | (unstable) | 3.21.9-3 |
[bullseye] - protobuf <no-dsa> (Minor issue)
[stretch] - protobuf <no-dsa> (Minor issue)
https://www.openwall.com/lists/oss-security/2022/01/12/4
https://cloud.google.com/support/bulletins#gcp-2022-001
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=39330 (unclear, might be bogus)
https://github.com/protocolbuffers/protobuf/pull/9371/commits/5ea2bdf6d7483d64a6b02fcf00ee51fbfb80e847