CVE-2022-3171
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
12/10/2022
Last modified:
07/11/2023
Description
A parsing issue with binary data in protobuf-java core and lite versions prior to 3.21.7, 3.20.3, 3.19.6 and 3.16.3 can lead to a denial of service attack. Inputs containing multiple instances of non-repeated embedded messages with repeated or unknown fields causes objects to be converted back-n-forth between mutable and immutable forms, resulting in potentially long garbage collection pauses. We recommend updating to the versions mentioned above.
Impact
Base Score 3.x
7.50
Severity 3.x
HIGH
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:google:google-protobuf:*:*:*:*:*:ruby:*:* | 3.16.3 (excluding) | |
cpe:2.3:a:google:google-protobuf:*:*:*:*:*:ruby:*:* | 3.17.0 (including) | 3.19.6 (excluding) |
cpe:2.3:a:google:google-protobuf:*:*:*:*:*:ruby:*:* | 3.20.0 (including) | 3.20.3 (excluding) |
cpe:2.3:a:google:google-protobuf:*:*:*:*:*:ruby:*:* | 3.21.0 (including) | 3.21.7 (excluding) |
cpe:2.3:a:google:protobuf-java:*:*:*:*:*:*:*:* | 3.16.3 (excluding) | |
cpe:2.3:a:google:protobuf-java:*:*:*:*:*:*:*:* | 3.17.0 (including) | 3.19.6 (excluding) |
cpe:2.3:a:google:protobuf-java:*:*:*:*:*:*:*:* | 3.20.0 (including) | 3.20.3 (excluding) |
cpe:2.3:a:google:protobuf-java:*:*:*:*:*:*:*:* | 3.21.0 (including) | 3.21.7 (excluding) |
cpe:2.3:a:google:protobuf-javalite:*:*:*:*:*:*:*:* | 3.16.3 (excluding) | |
cpe:2.3:a:google:protobuf-javalite:*:*:*:*:*:*:*:* | 3.17.0 (including) | 3.19.6 (excluding) |
cpe:2.3:a:google:protobuf-javalite:*:*:*:*:*:*:*:* | 3.20.0 (including) | 3.20.3 (excluding) |
cpe:2.3:a:google:protobuf-javalite:*:*:*:*:*:*:*:* | 3.21.0 (including) | 3.21.7 (excluding) |
cpe:2.3:a:google:protobuf-kotlin:*:*:*:*:*:*:*:* | 3.16.3 (excluding) | |
cpe:2.3:a:google:protobuf-kotlin:*:*:*:*:*:*:*:* | 3.17.0 (including) | 3.19.6 (excluding) |
cpe:2.3:a:google:protobuf-kotlin:*:*:*:*:*:*:*:* | 3.20.0 (including) | 3.20.3 (excluding) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://github.com/protocolbuffers/protobuf/security/advisories/GHSA-h4h5-3hr4-j3g2
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CBAUKJQL6O4TIWYBENORSY5P43TVB4M3/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MPCGUT3T5L6C3IDWUPSUO22QDCGQKTOP/
- https://security.gentoo.org/glsa/202301-09