First published: Wed Oct 12 2022(Updated: )
A parsing issue with binary data in protobuf-java core and lite versions prior to 3.21.7, 3.20.3, 3.19.6 and 3.16.3 can lead to a denial of service attack. Inputs containing multiple instances of non-repeated embedded messages with repeated or unknown fields causes objects to be converted back-n-forth between mutable and immutable forms, resulting in potentially long garbage collection pauses. We recommend updating to the versions mentioned above.
Credit: cve-coordination@google.com
Affected Software | Affected Version | How to fix |
---|---|---|
IBM Disconnected Log Collector | <=v1.0 - v1.8.2 | |
redhat/protobuf-java | <3.21.7 | 3.21.7 |
redhat/protobuf-java | <3.20.3 | 3.20.3 |
redhat/protobuf-java | <3.19.6 | 3.19.6 |
redhat/protobuf-java | <3.16.3 | 3.16.3 |
Google Google-protobuf Ruby | <3.16.3 | |
Google Google-protobuf Ruby | >=3.17.0<3.19.6 | |
Google Google-protobuf Ruby | >=3.20.0<3.20.3 | |
Google Google-protobuf Ruby | >=3.21.0<3.21.7 | |
Google Protobuf-java | <3.16.3 | |
Google Protobuf-java | >=3.17.0<3.19.6 | |
Google Protobuf-java | >=3.20.0<3.20.3 | |
Google Protobuf-java | >=3.21.0<3.21.7 | |
Google Protobuf-javalite | <3.16.3 | |
Google Protobuf-javalite | >=3.17.0<3.19.6 | |
Google Protobuf-javalite | >=3.20.0<3.20.3 | |
Google Protobuf-javalite | >=3.21.0<3.21.7 | |
Google Protobuf-kotlin | <3.16.3 | |
Google Protobuf-kotlin | >=3.17.0<3.19.6 | |
Google Protobuf-kotlin | >=3.20.0<3.20.3 | |
Google Protobuf-kotlin | >=3.21.0<3.21.7 | |
Google Protobuf-kotlin-lite | <3.16.3 | |
Google Protobuf-kotlin-lite | >=3.17.0<3.19.6 | |
Google Protobuf-kotlin-lite | >=3.20.0<3.20.3 | |
Google Protobuf-kotlin-lite | >=3.21.0<3.21.7 | |
Fedoraproject Fedora | =37 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
The vulnerability ID for this issue is CVE-2022-3171.
CVE-2022-3171 has a severity level of high.
This vulnerability can be exploited through malicious inputs containing multiple instances of non-repeated embedded messages with repeated or unknown fields.
The affected software is protobuf-java core and lite versions prior to 3.21.7, 3.20.3, 3.19.6, and 3.16.3.
To mitigate this vulnerability, update the protobuf-java package to version 3.21.7, 3.20.3, 3.19.6, or 3.16.3.