Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2021-22569

Опубликовано: 10 янв. 2022
Источник: debian
EPSS Низкий

Описание

An issue in protobuf-java allowed the interleaving of com.google.protobuf.UnknownFieldSet fields in such a way that would be processed out of order. A small malicious payload can occupy the parser for several minutes by creating large numbers of short-lived objects that cause frequent, repeated pauses. We recommend upgrading libraries beyond the vulnerable versions.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
protobuffixed3.19.3-1experimentalpackage
protobuffixed3.21.9-3package
protobuffixed3.12.4-1+deb11u1bullseyepackage
protobufno-dsastretchpackage

Примечания

  • https://www.openwall.com/lists/oss-security/2022/01/12/4

  • https://cloud.google.com/support/bulletins#gcp-2022-001

  • https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=39330 (unclear, might be bogus)

  • https://github.com/protocolbuffers/protobuf/pull/9371/commits/5ea2bdf6d7483d64a6b02fcf00ee51fbfb80e847

EPSS

Процентиль: 52%
0.00291
Низкий

Связанные уязвимости

CVSS3: 7.5
ubuntu
около 4 лет назад

An issue in protobuf-java allowed the interleaving of com.google.protobuf.UnknownFieldSet fields in such a way that would be processed out of order. A small malicious payload can occupy the parser for several minutes by creating large numbers of short-lived objects that cause frequent, repeated pauses. We recommend upgrading libraries beyond the vulnerable versions.

CVSS3: 5.5
redhat
около 4 лет назад

An issue in protobuf-java allowed the interleaving of com.google.protobuf.UnknownFieldSet fields in such a way that would be processed out of order. A small malicious payload can occupy the parser for several minutes by creating large numbers of short-lived objects that cause frequent, repeated pauses. We recommend upgrading libraries beyond the vulnerable versions.

CVSS3: 7.5
nvd
около 4 лет назад

An issue in protobuf-java allowed the interleaving of com.google.protobuf.UnknownFieldSet fields in such a way that would be processed out of order. A small malicious payload can occupy the parser for several minutes by creating large numbers of short-lived objects that cause frequent, repeated pauses. We recommend upgrading libraries beyond the vulnerable versions.

CVSS3: 5.5
msrc
больше 1 года назад

Описание отсутствует

CVSS3: 7.5
github
около 4 лет назад

A potential Denial of Service issue in protobuf-java

EPSS

Процентиль: 52%
0.00291
Низкий