A parsing issue with binary data in protobuf-java core and lite versions prior to 3.21.7, 3.20.3, 3.19.6 and 3.16.3 can lead to a denial of service attack. Inputs containing multiple instances of non-repeated embedded messages with repeated or unknown fields causes objects to be converted back-n-forth between mutable and immutable forms, resulting in potentially long garbage collection pauses. We recommend updating to the versions mentioned above.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
21 Nov 2024, 07:18
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 4.3 |
References | () https://github.com/protocolbuffers/protobuf/security/advisories/GHSA-h4h5-3hr4-j3g2 - Third Party Advisory | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CBAUKJQL6O4TIWYBENORSY5P43TVB4M3/ - | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MPCGUT3T5L6C3IDWUPSUO22QDCGQKTOP/ - | |
References | () https://security.gentoo.org/glsa/202301-09 - Third Party Advisory |
07 Nov 2023, 03:50
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Information
Published : 2022-10-12 23:15
Updated : 2024-11-21 07:18
NVD link : CVE-2022-3171
Mitre link : CVE-2022-3171
CVE.ORG link : CVE-2022-3171
JSON object : View
Products Affected
- google-protobuf
- protobuf-java
- protobuf-kotlin
- protobuf-kotlin-lite
- protobuf-javalite
fedoraproject
- fedora
CWE