USN-5945-1: Protocol Buffers vulnerabilities

Publication date

13 March 2023

Overview

Several security issues were fixed in Protocol Buffers.


Packages

  • protobuf - protocol buffers C++ library (development files)

Details

It was discovered that Protocol Buffers did not properly validate field
com.google.protobuf.UnknownFieldSet in protobuf-java. An attacker could
possibly use this issue to perform a denial of service attack. This issue
only affected protobuf Ubuntu 22.04 LTS and Ubuntu 22.10. (CVE-2021-22569)

It was discovered that Protocol Buffers did not properly parse certain
symbols. An attacker could possibly use this issue to cause a denial of
service or other unspecified impact. (CVE-2021-22570)

It was discovered that Protocol Buffers did not properly manage memory when
parsing specifically crafted messages. An attacker could possibly use this
issue to cause applications using protobuf to crash, resulting in a denial
of service. This issue only affected Ubuntu 18.04 LTS, Ubuntu 20.04 LTS,
Ubuntu 22.04 LTS and Ubuntu 22.10. (

It was discovered that Protocol Buffers did not properly validate field
com.google.protobuf.UnknownFieldSet in protobuf-java. An attacker could
possibly use this issue to perform a denial of service attack. This issue
only affected protobuf Ubuntu 22.04 LTS and Ubuntu 22.10. (CVE-2021-22569)

It was discovered that Protocol Buffers did not properly parse certain
symbols. An attacker could possibly use this issue to cause a denial of
service or other unspecified impact. (CVE-2021-22570)

It was discovered that Protocol Buffers did not properly manage memory when
parsing specifically crafted messages. An attacker could possibly use this
issue to cause applications using protobuf to crash, resulting in a denial
of service. This issue only affected Ubuntu 18.04 LTS, Ubuntu 20.04 LTS,
Ubuntu 22.04 LTS and Ubuntu 22.10. (CVE-2022-1941)


Update instructions

In general, a standard system update will make all the necessary changes.

Learn more about how to get the fixes.

The problem can be corrected by updating your system to the following package versions:

Ubuntu Release Package Version
22.10 kinetic libprotobuf-lite23 –  3.12.4-1ubuntu7.22.10.1
libprotoc23 –  3.12.4-1ubuntu7.22.10.1
python3-protobuf –  3.12.4-1ubuntu7.22.10.1
protobuf-compiler –  3.12.4-1ubuntu7.22.10.1
libprotobuf-java –  3.12.4-1ubuntu7.22.10.1
libprotobuf23 –  3.12.4-1ubuntu7.22.10.1
22.04 jammy libprotobuf-lite23 –  3.12.4-1ubuntu7.22.04.1
libprotoc23 –  3.12.4-1ubuntu7.22.04.1
python3-protobuf –  3.12.4-1ubuntu7.22.04.1
protobuf-compiler –  3.12.4-1ubuntu7.22.04.1
libprotobuf-java –  3.12.4-1ubuntu7.22.04.1
libprotobuf23 –  3.12.4-1ubuntu7.22.04.1
20.04 focal libprotoc17 –  3.6.1.3-2ubuntu5.2
libprotoc-dev –  3.6.1.3-2ubuntu5.2
python-protobuf –  3.6.1.3-2ubuntu5.2
libprotobuf-lite17 –  3.6.1.3-2ubuntu5.2
python3-protobuf –  3.6.1.3-2ubuntu5.2
protobuf-compiler –  3.6.1.3-2ubuntu5.2
18.04 bionic libprotoc10 –  3.0.0-9.1ubuntu1.1
libprotobuf10 –  3.0.0-9.1ubuntu1.1
python3-protobuf –  3.0.0-9.1ubuntu1.1
libprotobuf-lite10 –  3.0.0-9.1ubuntu1.1
python-protobuf –  3.0.0-9.1ubuntu1.1
protobuf-compiler –  3.0.0-9.1ubuntu1.1
14.04 trusty libprotoc8 –  2.5.0-9ubuntu1+esm1  
libprotobuf8 –  2.5.0-9ubuntu1+esm1  
libprotobuf-lite8 –  2.5.0-9ubuntu1+esm1  
protobuf-compiler –  2.5.0-9ubuntu1+esm1  

Reduce your security exposure

Ubuntu Pro provides ten-year security coverage to 25,000+ packages in Main and Universe repositories, and it is free for up to five machines.


Have additional questions?

Talk to a member of the team ›