First published: Mon Nov 01 2021(Updated: )
OctoRPKI tries to load the entire contents of a repository in memory, and in the case of a GZIP bomb, unzip it in memory, making it possible to create a repository that makes OctoRPKI run out of memory (and thus crash).
Credit: cna@cloudflare.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/cfrpki | 1.4.2-1~deb11u1 1.4.4-1 1.5.10-2 | |
Cloudflare Octorpki | <1.3.0 | |
Debian Debian Linux | =11.0 |
Upgrade to 1.4
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2021-3912 is medium with a CVSS score of 6.5.
The affected software includes 'cfrpki' package version 1.4.2-1~deb11u1, 1.4.4-1, and 1.5.10-2 from the Debian repository, as well as 'Cloudflare Octorpki' version up to exclusive 1.3.0.
The recommended remedy for CVE-2021-3912 is to update the affected 'cfrpki' package to version 1.4.2-1~deb11u1, 1.4.4-1, or 1.5.10-2 from the Debian repository. For 'Cloudflare Octorpki', update to a version higher than 1.3.0.
A GZIP bomb is a maliciously crafted compressed file that exploits the way gzip decompression works to consume excessive memory and potentially crash the system or application.
You can find more information about CVE-2021-3912 on the GitHub security advisory page (https://github.com/cloudflare/cfrpki/security/advisories/GHSA-g9wh-3vrx-r7hg) and the Debian security tracker page (https://security-tracker.debian.org/tracker/CVE-2021-3912). Additionally, the Debian website has a security announcement (https://www.debian.org/security/2022/dsa-5041) with further details.