Protobuf-c v1.4.0 was discovered to contain an invalid arithmetic shift via the function parse_tag_and_wiretype in protobuf-c/protobuf-c.c. This vulnerability allows attackers to cause a Denial of Service (DoS) via unspecified vectors.
References
Link | Resource |
---|---|
https://github.com/protobuf-c/protobuf-c/issues/506 | Exploit Issue Tracking Patch Third Party Advisory |
https://github.com/protobuf-c/protobuf-c/pull/508 | Exploit Issue Tracking Patch Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FFN2GHUEGTSHRD7J5PKQ5DRSJSEQ2IKN/ | |
https://github.com/protobuf-c/protobuf-c/issues/506 | Exploit Issue Tracking Patch Third Party Advisory |
https://github.com/protobuf-c/protobuf-c/pull/508 | Exploit Issue Tracking Patch Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FFN2GHUEGTSHRD7J5PKQ5DRSJSEQ2IKN/ |
Configurations
History
21 Nov 2024, 07:07
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/protobuf-c/protobuf-c/issues/506 - Exploit, Issue Tracking, Patch, Third Party Advisory | |
References | () https://github.com/protobuf-c/protobuf-c/pull/508 - Exploit, Issue Tracking, Patch, Third Party Advisory | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FFN2GHUEGTSHRD7J5PKQ5DRSJSEQ2IKN/ - |
07 Nov 2023, 03:48
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Information
Published : 2022-06-23 17:15
Updated : 2024-11-21 07:07
NVD link : CVE-2022-33070
Mitre link : CVE-2022-33070
CVE.ORG link : CVE-2022-33070
JSON object : View
Products Affected
protobuf-c_project
- protobuf-c
fedoraproject
- fedora
CWE