First published: Mon Jan 11 2021(Updated: )
A flaw was found in github.com/gogo/protobuf before 1.3.2 that allows an out-of-bounds access when unmarshalling certain protobuf objects. This flaw allows a remote attacker to send crafted protobuf messages, causing panic and resulting in a denial of service. The highest threat from this vulnerability is to availability.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kiali | <0:v1.24.7.redhat1-1.el8 | 0:v1.24.7.redhat1-1.el8 |
redhat/cri-o | <0:1.20.0-0.rhaos4.7.git8921e00.el8.51 | 0:1.20.0-0.rhaos4.7.git8921e00.el8.51 |
redhat/cri-tools | <0:1.20.0-1.el8 | 0:1.20.0-1.el8 |
redhat/openshift-clients | <0:4.7.0-202103251046.p0.git.3957.c4da68b.el7 | 0:4.7.0-202103251046.p0.git.3957.c4da68b.el7 |
redhat/openshift | <0:4.8.0-202107161820.p0.git.051ac4f.assembly.stream.el8 | 0:4.8.0-202107161820.p0.git.051ac4f.assembly.stream.el8 |
redhat/openshift-clients | <0:4.8.0-202106281541.p0.git.1077b05.assembly.stream.el8 | 0:4.8.0-202106281541.p0.git.1077b05.assembly.stream.el8 |
redhat/github.com/gogo/protobuf | <1.3.2 | 1.3.2 |
Google Protocol Buffers | <1.3.2 | |
HashiCorp Consul | <1.8.15 | |
HashiCorp Consul | <1.8.15 | |
HashiCorp Consul | >=1.9.0<1.9.9 | |
HashiCorp Consul | >=1.9.0<1.9.9 | |
HashiCorp Consul | >=1.10.0<1.10.2 | |
HashiCorp Consul | >=1.10.0<1.10.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
The vulnerability ID of this issue is CVE-2021-3121.
The severity of CVE-2021-3121 is high with a CVSS score of 8.6.
The affected software includes github.com/gogo/protobuf versions up to 1.3.2, kiali up to v1.24.7.redhat1-1.el8, cri-o up to 1.20.0-0.rhaos4.7.git8921e00.el8.51, cri-tools up to 1.20.0-1.el8, and others.
This vulnerability occurs due to an out-of-bounds access when unmarshalling certain protobuf objects in github.com/gogo/protobuf.
To fix CVE-2021-3121, update your golang/protobuf package to version 1.3.2 or newer and apply any available patches or updates for the affected software.