Lucene search

K
gentooGentoo FoundationGLSA-202408-31
HistoryAug 12, 2024 - 12:00 a.m.

protobuf, protobuf-python: Denial of Service

2024-08-1200:00:00
Gentoo Foundation
security.gentoo.org
5
google protocol buffers
parsing vulnerability
out of memory
crafting message
service failure
unsanitized input
upgrade
emerge
latest version
cve identifier

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

AI Score

7.2

Confidence

Low

Background

Google’s Protocol Buffers are an extensible mechanism for serializing structured data.

Description

A vulnerability has been discovered in protobuf and protobuf-python. Please review the CVE identifiers referenced below for details.

Impact

A parsing vulnerability for the MessageSet type can lead to out of memory failures. A specially crafted message with multiple key-value per elements creates parsing issues, and can lead to a Denial of Service against services receiving unsanitized input.

Workaround

There is no known workaround at this time.

Resolution

All protobuf and protobuf-python users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=dev-libs/protobuf-3.20.3"
 # emerge --ask --oneshot --verbose ">=dev-python/protobuf-python-3.19.6"
OSVersionArchitecturePackageVersionFilename
Gentooanyalldev-libs/protobuf< 3.20.3UNKNOWN
Gentooanyalldev-python/protobuf-python< 3.19.6UNKNOWN

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

AI Score

7.2

Confidence

Low