Lucene search

K
amazonAmazonALAS2-2023-1973
HistoryMar 02, 2023 - 10:35 p.m.

Medium: protobuf

2023-03-0222:35:00
alas.aws.amazon.com
21
protocolbuffers
parsing vulnerability
out of memory
denial of service
upgrade
mitigation

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

7.6 High

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

59.0%

Issue Overview:

A parsing vulnerability for the MessageSet type in the ProtocolBuffers versions prior to and including 3.16.1, 3.17.3, 3.18.2, 3.19.4, 3.20.1 and 3.21.5 for protobuf-cpp, and versions prior to and including 3.16.1,
3.17.3, 3.18.2, 3.19.4, 3.20.1 and 4.21.5 for protobuf-python can lead to out of memory failures. A specially crafted message with multiple key-value per elements creates parsing issues, and can lead to a Denial of Service against
services receiving unsanitized input. We recommend upgrading to versions 3.18.3, 3.19.5, 3.20.2, 3.21.6 for protobuf-cpp and 3.18.3, 3.19.5, 3.20.2, 4.21.6 for protobuf-python. Versions for 3.16 and 3.17 are no longer updated. (CVE-2022-1941)

Affected Packages:

protobuf

Note:

This advisory is applicable to Amazon Linux 2 (AL2) Core repository. Visit this FAQ section for the difference between AL2 Core and AL2 Extras advisories.

Issue Correction:
Run yum update protobuf to update your system.

New Packages:

aarch64:  
    protobuf-2.5.0-8.amzn2.0.4.aarch64  
    protobuf-compiler-2.5.0-8.amzn2.0.4.aarch64  
    protobuf-devel-2.5.0-8.amzn2.0.4.aarch64  
    protobuf-static-2.5.0-8.amzn2.0.4.aarch64  
    protobuf-lite-2.5.0-8.amzn2.0.4.aarch64  
    protobuf-lite-devel-2.5.0-8.amzn2.0.4.aarch64  
    protobuf-lite-static-2.5.0-8.amzn2.0.4.aarch64  
    protobuf-python-2.5.0-8.amzn2.0.4.aarch64  
    protobuf-vim-2.5.0-8.amzn2.0.4.aarch64  
    protobuf-emacs-2.5.0-8.amzn2.0.4.aarch64  
    protobuf-emacs-el-2.5.0-8.amzn2.0.4.aarch64  
    protobuf-java-2.5.0-8.amzn2.0.4.aarch64  
    protobuf-javadoc-2.5.0-8.amzn2.0.4.aarch64  
    protobuf-debuginfo-2.5.0-8.amzn2.0.4.aarch64  
  
i686:  
    protobuf-2.5.0-8.amzn2.0.4.i686  
    protobuf-compiler-2.5.0-8.amzn2.0.4.i686  
    protobuf-devel-2.5.0-8.amzn2.0.4.i686  
    protobuf-static-2.5.0-8.amzn2.0.4.i686  
    protobuf-lite-2.5.0-8.amzn2.0.4.i686  
    protobuf-lite-devel-2.5.0-8.amzn2.0.4.i686  
    protobuf-lite-static-2.5.0-8.amzn2.0.4.i686  
    protobuf-python-2.5.0-8.amzn2.0.4.i686  
    protobuf-vim-2.5.0-8.amzn2.0.4.i686  
    protobuf-emacs-2.5.0-8.amzn2.0.4.i686  
    protobuf-emacs-el-2.5.0-8.amzn2.0.4.i686  
    protobuf-java-2.5.0-8.amzn2.0.4.i686  
    protobuf-javadoc-2.5.0-8.amzn2.0.4.i686  
    protobuf-debuginfo-2.5.0-8.amzn2.0.4.i686  
  
src:  
    protobuf-2.5.0-8.amzn2.0.4.src  
  
x86_64:  
    protobuf-2.5.0-8.amzn2.0.4.x86_64  
    protobuf-compiler-2.5.0-8.amzn2.0.4.x86_64  
    protobuf-devel-2.5.0-8.amzn2.0.4.x86_64  
    protobuf-static-2.5.0-8.amzn2.0.4.x86_64  
    protobuf-lite-2.5.0-8.amzn2.0.4.x86_64  
    protobuf-lite-devel-2.5.0-8.amzn2.0.4.x86_64  
    protobuf-lite-static-2.5.0-8.amzn2.0.4.x86_64  
    protobuf-python-2.5.0-8.amzn2.0.4.x86_64  
    protobuf-vim-2.5.0-8.amzn2.0.4.x86_64  
    protobuf-emacs-2.5.0-8.amzn2.0.4.x86_64  
    protobuf-emacs-el-2.5.0-8.amzn2.0.4.x86_64  
    protobuf-java-2.5.0-8.amzn2.0.4.x86_64  
    protobuf-javadoc-2.5.0-8.amzn2.0.4.x86_64  
    protobuf-debuginfo-2.5.0-8.amzn2.0.4.x86_64  

Additional References

Red Hat: CVE-2022-1941

Mitre: CVE-2022-1941

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

7.6 High

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

59.0%