Bug 2039903 (CVE-2021-22569)

Summary: CVE-2021-22569 protobuf-java: potential DoS in the parsing procedure for binary data
Product: [Other] Security Response Reporter: Guilherme de Almeida Suckevicz <gsuckevi>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: aileenc, akoufoud, alazarot, anstephe, aos-bugs, asoldano, atangrin, avibelli, bbaranow, bbuckingham, bcourt, bgeorges, bibryam, bmaxwell, bmontgom, brian.stansberry, btotty, cdewolf, chazlett, clement.escoffier, cmoulliard, dandread, darran.lofthouse, dkreling, dosoudil, drieden, ehelms, eleandro, eparis, eric.wittmann, etirelli, ewolinet, fjuma, ggaughan, gmalinko, gmorling, gsmet, hamadhan, hbraun, ibek, ikanello, iweiss, janstey, jburrell, jcantril, jnethert, jochrist, jokerman, jolee, jpallich, jpechane, jperkins, jrokos, jschatte, jsherril, jstastny, jwon, krathod, kverlaen, kwills, lgao, lthon, lzap, mhulan, mmccune, mnovotny, msochure, msvehla, mszynkie, myarboro, nmoumoul, nstielau, nwallace, orabin, pantinor, pcreech, pdelbell, peholase, pgallagh, pjindal, pmackay, probinso, rchan, rguimara, rrajasek, rruss, rstancel, rsvoboda, sbiarozk, sd-operator-metering, sdouglas, smaestri, sponnaga, tflannag, tom.jenkinson, tzimanyi, vkumar, yborgess
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: protobuf 3.16.1, protobuf 3.18.2, protobuf 3.19.2 Doc Type: If docs needed, set a value
Doc Text:
A flaw was found in protobuf-java. Google Protocol Buffer (protobuf-java) allows the interleaving of com.google.protobuf.UnknownFieldSet fields. By persuading a victim to open specially-crafted content, a remote attacker could cause a timeout in the ProtobufFuzzer function, resulting in a denial of service.
Story Points: ---
Clone Of: Environment:
Last Closed: 2022-03-22 19:31:12 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 2041742, 2049276, 2049277, 2049278    
Bug Blocks: 2039904    

Description Guilherme de Almeida Suckevicz 2022-01-12 17:17:41 UTC
An issue in protobuf-java allowed the interleaving of com.google.protobuf.UnknownFieldSet fields in such a way that would be processed out of order. A small malicious payload can occupy the parser for several minutes by creating large numbers of short-lived objects that cause frequent, repeated pauses. We recommend upgrading libraries beyond the vulnerable versions.

References:
https://github.com/protocolbuffers/protobuf/security/advisories/GHSA-wrvw-hg22-4m67
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=39330
https://cloud.google.com/support/bulletins#gcp-2022-001

Comment 12 juneau 2022-02-07 20:22:35 UTC
Marking openshift-hosted-aro4 and openshift-hosted-osd4 affected/delegated per openshift-4.

Comment 16 errata-xmlrpc 2022-03-22 15:35:25 UTC
This issue has been addressed in the following products:

  RHINT Camel-Q 2.2.1

Via RHSA-2022:1013 https://access.redhat.com/errata/RHSA-2022:1013

Comment 17 Product Security DevOps Team 2022-03-22 19:31:06 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2021-22569

Comment 18 errata-xmlrpc 2022-05-18 10:56:26 UTC
This issue has been addressed in the following products:

  Red Hat build of Quarkus 2.7.5

Via RHSA-2022:4623 https://access.redhat.com/errata/RHSA-2022:4623

Comment 19 errata-xmlrpc 2022-07-07 14:21:54 UTC
This issue has been addressed in the following products:

  Red Hat Fuse 7.11

Via RHSA-2022:5532 https://access.redhat.com/errata/RHSA-2022:5532

Comment 20 errata-xmlrpc 2022-08-04 04:48:16 UTC
This issue has been addressed in the following products:

  RHPAM 7.13.0 async

Via RHSA-2022:5903 https://access.redhat.com/errata/RHSA-2022:5903

Comment 21 errata-xmlrpc 2022-10-06 12:26:51 UTC
This issue has been addressed in the following products:

  RHINT Service Registry 2.3.0 GA

Via RHSA-2022:6835 https://access.redhat.com/errata/RHSA-2022:6835

Comment 22 errata-xmlrpc 2022-11-09 13:48:42 UTC
This issue has been addressed in the following products:

  RHINT Debezium 1.9.7

Via RHSA-2022:7896 https://access.redhat.com/errata/RHSA-2022:7896

Comment 23 errata-xmlrpc 2022-12-14 13:17:25 UTC
This issue has been addressed in the following products:

  Red Hat Openshift Application Runtimes

Via RHSA-2022:8761 https://access.redhat.com/errata/RHSA-2022:8761