CVE-2022-3510

EUVD-2022-7503
A parsing issue similar to CVE-2022-3171, but with Message-Type Extensions in protobuf-java core and lite versions prior to 3.21.7, 3.20.3, 3.19.6 and 3.16.3 can lead to a denial of service attack. Inputs containing multiple instances of non-repeated embedded messages with repeated or unknown fields causes objects to be converted back-n-forth between mutable and immutable forms, resulting in potentially long garbage collection pauses. We recommend updating to the versions mentioned above.

ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
7.5 HIGH
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
GoogleCNA
7.5 HIGH
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Base Score
CVSS 3.x
EPSS Score
Percentile: 21%
Affected Products (NVD)
VendorProductVersion
googleprotobuf-java
3.16.0 ≤
𝑥
< 3.16.3
googleprotobuf-java
3.19.0 ≤
𝑥
< 3.19.6
googleprotobuf-java
3.20.0 ≤
𝑥
< 3.20.3
googleprotobuf-java
3.21.0 ≤
𝑥
< 3.21.7
googleprotobuf-javalite
3.16.0 ≤
𝑥
< 3.16.3
googleprotobuf-javalite
3.17.0 ≤
𝑥
< 3.19.6
googleprotobuf-javalite
3.20.0 ≤
𝑥
< 3.20.3
googleprotobuf-javalite
3.21.0 ≤
𝑥
< 3.21.7
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
protobuf
bookworm
3.21.12-3
fixed
bullseye
ignored
buster
ignored
sid
3.21.12-10
fixed
trixie
3.21.12-10
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
protobuf
bionic
ignored
focal
ignored
jammy
ignored
kinetic
ignored
lunar
not-affected
trusty
ignored
xenial
ignored