CVE-2022-3510

A parsing issue similar to CVE-2022-3171, but with Message-Type Extensions in protobuf-java core and lite versions prior to 3.21.7, 3.20.3, 3.19.6 and 3.16.3 can lead to a denial of service attack. Inputs containing multiple instances of non-repeated embedded messages with repeated or unknown fields causes objects to be converted back-n-forth between mutable and immutable forms, resulting in potentially long garbage collection pauses. We recommend updating to the versions mentioned above.

ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
7.5 HIGH
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
GoogleCNA
7.5 HIGH
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVEADP
---
---
CISA-ADPADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 16%
VendorProductVersion
googleprotobuf-java
3.16.0 ≤
𝑥
< 3.16.3
googleprotobuf-java
3.19.0 ≤
𝑥
< 3.19.6
googleprotobuf-java
3.20.0 ≤
𝑥
< 3.20.3
googleprotobuf-java
3.21.0 ≤
𝑥
< 3.21.7
googleprotobuf-javalite
3.16.0 ≤
𝑥
< 3.16.3
googleprotobuf-javalite
3.17.0 ≤
𝑥
< 3.19.6
googleprotobuf-javalite
3.20.0 ≤
𝑥
< 3.20.3
googleprotobuf-javalite
3.21.0 ≤
𝑥
< 3.21.7
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
protobuf
bullseye
ignored
buster
ignored
bookworm
3.21.12-3
fixed
sid
3.21.12-10
fixed
trixie
3.21.12-10
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
protobuf
lunar
not-affected
kinetic
ignored
jammy
ignored
focal
ignored
bionic
ignored
xenial
ignored
trusty
ignored