USN-5769-1: protobuf vulnerabilities
Publication date
8 December 2022
Overview
Several security issues were fixed in protobuf.
Releases
Packages
- protobuf - protocol buffers C++ library (development files)
Details
It was discovered that protobuf did not properly manage memory when serializing
large messages. An attacker could possibly use this issue to cause applications
using protobuf to crash, resulting in a denial of service, or possibly execute
arbitrary code. (CVE-2015-5237)
It was discovered that protobuf did not properly manage memory when parsing
specifically crafted messages. An attacker could possibly use this issue to
cause applications using protobuf to crash, resulting in a denial of service.
(CVE-2022-1941)
It was discovered that protobuf did not properly manage memory when serializing
large messages. An attacker could possibly use this issue to cause applications
using protobuf to crash, resulting in a denial of service, or possibly execute
arbitrary code. (CVE-2015-5237)
It was discovered that protobuf did not properly manage memory when parsing
specifically crafted messages. An attacker could possibly use this issue to
cause applications using protobuf to crash, resulting in a denial of service.
(CVE-2022-1941)
Update instructions
In general, a standard system update will make all the necessary changes.
Learn more about how to get the fixes.The problem can be corrected by updating your system to the following package versions:
Ubuntu Release | Package Version | ||
---|---|---|---|
16.04 xenial | libprotoc9v5 – 2.6.1-1.3ubuntu0.1~esm2 | ||
libprotobuf-lite9v5 – 2.6.1-1.3ubuntu0.1~esm2 | |||
python-protobuf – 2.6.1-1.3ubuntu0.1~esm2 | |||
libprotobuf9v5 – 2.6.1-1.3ubuntu0.1~esm2 | |||
protobuf-compiler – 2.6.1-1.3ubuntu0.1~esm2 |
Reduce your security exposure
Ubuntu Pro provides ten-year security coverage to 25,000+ packages in Main and Universe repositories, and it is free for up to five machines.