Lucene search

K
ubuntucveUbuntu.comUB:CVE-2022-1941
HistorySep 22, 2022 - 12:00 a.m.

CVE-2022-1941

2022-09-2200:00:00
ubuntu.com
ubuntu.com
16
protocolbuffers
parsing vulnerability
out of memory
denial of service
unsanitized input
upgrade
versions
3.16
3.17
3.18
3.19
3.20
3.21
4.

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

0.002 Low

EPSS

Percentile

59.1%

A parsing vulnerability for the MessageSet type in the ProtocolBuffers
versions prior to and including 3.16.1, 3.17.3, 3.18.2, 3.19.4, 3.20.1 and
3.21.5 for protobuf-cpp, and versions prior to and including 3.16.1,
3.17.3, 3.18.2, 3.19.4, 3.20.1 and 4.21.5 for protobuf-python can lead to
out of memory failures. A specially crafted message with multiple key-value
per elements creates parsing issues, and can lead to a Denial of Service
against services receiving unsanitized input. We recommend upgrading to
versions 3.18.3, 3.19.5, 3.20.2, 3.21.6 for protobuf-cpp and 3.18.3,
3.19.5, 3.20.2, 4.21.6 for protobuf-python. Versions for 3.16 and 3.17 are
no longer updated.

OSVersionArchitecturePackageVersionFilename
ubuntu18.04noarchprotobuf< 3.0.0-9.1ubuntu1.1UNKNOWN
ubuntu20.04noarchprotobuf< 3.6.1.3-2ubuntu5.2UNKNOWN
ubuntu22.04noarchprotobuf< 3.12.4-1ubuntu7.22.04.1UNKNOWN
ubuntu22.10noarchprotobuf< 3.12.4-1ubuntu7.22.10.1UNKNOWN
ubuntu16.04noarchprotobuf< 2.6.1-1.3ubuntu0.1~esm2UNKNOWN

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

0.002 Low

EPSS

Percentile

59.1%