Name | CVE-2022-33070 |
Description | Protobuf-c v1.4.0 was discovered to contain an invalid arithmetic shift via the function parse_tag_and_wiretype in protobuf-c/protobuf-c.c. This vulnerability allows attackers to cause a Denial of Service (DoS) via unspecified vectors. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|---|---|---|
protobuf-c (PTS) | bullseye | 1.3.3-1 | vulnerable |
sid, trixie, bookworm | 1.4.1-1 | fixed |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|---|---|---|---|---|---|
protobuf-c | source | (unstable) | 1.4.1-1 |
[bullseye] - protobuf-c <no-dsa> (Minor issue)
[buster] - protobuf-c <no-dsa> (Minor issue)
https://github.com/protobuf-c/protobuf-c/issues/506
https://github.com/protobuf-c/protobuf-c/pull/508
https://github.com/protobuf-c/protobuf-c/commit/6e389ce2c34355d36009a8fb1666bed29fa2d4f4 (v1.4.1)