CVE-2022-1941

A parsing vulnerability for the MessageSet type in the ProtocolBuffers versions prior to and including 3.16.1, 3.17.3, 3.18.2, 3.19.4, 3.20.1 and 3.21.5 for protobuf-cpp, and versions prior to and including 3.16.1, 3.17.3, 3.18.2, 3.19.4, 3.20.1 and 4.21.5 for protobuf-python can lead to out of memory failures. A specially crafted message with multiple key-value per elements creates parsing issues, and can lead to a Denial of Service against services receiving unsanitized input. We recommend upgrading to versions 3.18.3, 3.19.5, 3.20.2, 3.21.6 for protobuf-cpp and 3.18.3, 3.19.5, 3.20.2, 4.21.6 for protobuf-python. Versions for 3.16 and 3.17 are no longer updated.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
7.5 HIGH
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
GoogleCNA
---
---
CISA-ADPADP
7.5 HIGH
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 27%
VendorProductVersion
googleprotobuf-cpp
𝑥
< 3.18.3
googleprotobuf-cpp
3.19.0 ≤
𝑥
< 3.19.5
googleprotobuf-cpp
3.20.0 ≤
𝑥
< 3.20.2
googleprotobuf-cpp
3.21.0 ≤
𝑥
< 3.21.6
googleprotobuf-python
𝑥
< 3.18.3
googleprotobuf-python
3.19.0 ≤
𝑥
< 3.19.5
googleprotobuf-python
3.20.0 ≤
𝑥
< 3.20.2
googleprotobuf-python
4.0.0 ≤
𝑥
< 4.21.6
debiandebian_linux
10.0
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
protobuf
bullseye
3.12.4-1+deb11u1
fixed
bookworm
3.21.12-3
fixed
sid
3.21.12-10
fixed
trixie
3.21.12-10
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
protobuf
lunar
not-affected
kinetic
Fixed 3.12.4-1ubuntu7.22.10.1
released
jammy
Fixed 3.12.4-1ubuntu7.22.04.1
released
focal
Fixed 3.6.1.3-2ubuntu5.2
released
bionic
Fixed 3.0.0-9.1ubuntu1.1
released
xenial
Fixed 2.6.1-1.3ubuntu0.1~esm2
released
trusty
ignored