Bug 2291470 (CVE-2022-1941) - CVE-2022-1941 protobuf: message parsing vulnerability in ProtocolBuffers
Summary: CVE-2022-1941 protobuf: message parsing vulnerability in ProtocolBuffers
Keywords:
Status: NEW
Alias: CVE-2022-1941
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Product Security
QA Contact:
URL:
Whiteboard:
Depends On:
Blocks: 2291474
TreeView+ depends on / blocked
 
Reported: 2024-06-12 10:29 UTC by Mauro Matteo Cascella
Modified: 2025-04-01 08:28 UTC (History)
50 users (show)

Fixed In Version: protobuf 3.18.3, protobuf 3.19.5, protobuf 3.20.2, protobuf 3.21.6
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description Mauro Matteo Cascella 2024-06-12 10:29:38 UTC
A parsing vulnerability for the MessageSet type in the ProtocolBuffers can lead to out of memory failures. A specially crafted message with multiple key-value per elements creates parsing issues, and can lead to a Denial of Service against services receiving unsanitized input.

References:
https://cloud.google.com/support/bulletins#GCP-2022-019
https://github.com/protocolbuffers/protobuf/security/advisories/GHSA-8gq9-2x98-w8hf
http://www.openwall.com/lists/oss-security/2022/09/27/1

Comment 2 Mauro Matteo Cascella 2024-06-12 10:49:19 UTC
Upstream fix:
https://github.com/protocolbuffers/protobuf/pull/10542


Note You need to log in before you can comment on or make changes to this bug.