CVE-2022-3171
12.10.2022, 23:15
A parsing issue with binary data in protobuf-java core and lite versions prior to 3.21.7, 3.20.3, 3.19.6 and 3.16.3 can lead to a denial of service attack. Inputs containing multiple instances of non-repeated embedded messages with repeated or unknown fields causes objects to be converted back-n-forth between mutable and immutable forms, resulting in potentially long garbage collection pauses. We recommend updating to the versions mentioned above.Enginsight
Vendor | Product | Version |
---|---|---|
google-protobuf | 𝑥 < 3.16.3 | |
google-protobuf | 3.17.0 ≤ 𝑥 < 3.19.6 | |
google-protobuf | 3.20.0 ≤ 𝑥 < 3.20.3 | |
google-protobuf | 3.21.0 ≤ 𝑥 < 3.21.7 | |
protobuf-java | 𝑥 < 3.16.3 | |
protobuf-java | 3.17.0 ≤ 𝑥 < 3.19.6 | |
protobuf-java | 3.20.0 ≤ 𝑥 < 3.20.3 | |
protobuf-java | 3.21.0 ≤ 𝑥 < 3.21.7 | |
protobuf-javalite | 𝑥 < 3.16.3 | |
protobuf-javalite | 3.17.0 ≤ 𝑥 < 3.19.6 | |
protobuf-javalite | 3.20.0 ≤ 𝑥 < 3.20.3 | |
protobuf-javalite | 3.21.0 ≤ 𝑥 < 3.21.7 | |
protobuf-kotlin | 𝑥 < 3.16.3 | |
protobuf-kotlin | 3.17.0 ≤ 𝑥 < 3.19.6 | |
protobuf-kotlin | 3.20.0 ≤ 𝑥 < 3.20.3 | |
protobuf-kotlin | 3.21.0 ≤ 𝑥 < 3.21.7 | |
protobuf-kotlin-lite | 𝑥 < 3.16.3 | |
protobuf-kotlin-lite | 3.17.0 ≤ 𝑥 < 3.19.6 | |
protobuf-kotlin-lite | 3.20.0 ≤ 𝑥 < 3.20.3 | |
protobuf-kotlin-lite | 3.21.0 ≤ 𝑥 < 3.21.7 |
𝑥
= Vulnerable software versions

Debian Releases

Ubuntu Releases
Common Weakness Enumeration
References