Bug 943441 (CVE-2015-5237) - VUL-0: CVE-2015-5237: protobuf: integer overflow in serialization
Summary: VUL-0: CVE-2015-5237: protobuf: integer overflow in serialization
Status: RESOLVED WONTFIX
Alias: CVE-2015-5237
Product: openSUSE Distribution
Classification: openSUSE
Component: Security (show other bugs)
Version: 13.2
Hardware: Other Other
: P3 - Medium : Minor (vote)
Target Milestone: ---
Assignee: Ludwig Nussel
QA Contact: E-mail List
URL:
Whiteboard:
Keywords:
Depends on:
Blocks:
 
Reported: 2015-08-27 11:15 UTC by Alexander Bergmann
Modified: 2015-08-31 13:48 UTC (History)
0 users

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Alexander Bergmann 2015-08-27 11:15:10 UTC
https://github.com/google/protobuf/issues/760

CVE-2015-5237: Integer overflow in serialization #760

int is used to express the size of serialized messages. If the size exceeds 4 GiB, the application may allocate a buffer which is too small, or protobuf itself does this, in google::protobuf::MessageLite::SerializeToString. This lead to a heap buffer overflow, which may be exploitable for code execution in some cases.

It has been suggested that serialization of messages larger than 2 GiB is unsupported. But there is no good way for an application to ensure that the limit is not exceeded accidentally, without imposing rather draconian limits. To some degree, this is an gets-style interface.

Right now, this is more or less harmless because the message sizes involved are substantial. But this will change over time. My worry is that it will be difficult to fix this because some of the overflowing computations end up in generated *.pb.cc files, so the eventual fix will not be a simple library update.

References:
https://bugzilla.redhat.com/show_bug.cgi?id=1256426
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-5237
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5237
Comment 1 Swamp Workflow Management 2015-08-27 22:00:17 UTC
bugbot adjusting priority
Comment 2 Ludwig Nussel 2015-08-31 13:48:08 UTC
There is no fix for protobuf. Apps must not feed more than 2G into protobuf according to upstream:
https://github.com/google/protobuf/issues/760#issuecomment-135519672