First published: Fri Nov 11 2022(Updated: )
A parsing issue similar to <a href="https://access.redhat.com/security/cve/CVE-2022-3171">CVE-2022-3171</a>, but with Message-Type Extensions in protobuf-java core and lite versions prior to 3.21.7, 3.20.3, 3.19.6 and 3.16.3 can lead to a denial of service attack. Inputs containing multiple instances of non-repeated embedded messages with repeated or unknown fields causes objects to be converted back-n-forth between mutable and immutable forms, resulting in potentially long garbage collection pauses. We recommend updating to the versions mentioned above.
Credit: cve-coordination@google.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/protobuf-java | <3.21.7 | 3.21.7 |
redhat/protobuf-java | <3.20.3 | 3.20.3 |
redhat/protobuf-java | <3.19.6 | 3.19.6 |
redhat/protobuf-java | <3.16.3 | 3.16.3 |
Google Protobuf-java | >=3.16.0<3.16.3 | |
Google Protobuf-java | >=3.19.0<3.19.6 | |
Google Protobuf-java | >=3.20.0<3.20.3 | |
Google Protobuf-java | >=3.21.0<3.21.7 | |
Google Protobuf-javalite | >=3.16.0<3.16.3 | |
Google Protobuf-javalite | >=3.17.0<3.19.6 | |
Google Protobuf-javalite | >=3.20.0<3.20.3 | |
Google Protobuf-javalite | >=3.21.0<3.21.7 | |
IBM Disconnected Log Collector | <=v1.0 - v1.8.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-3510 is a vulnerability in protobuf-java core and lite that allows a remote authenticated attacker to cause a denial of service.
An attacker can exploit CVE-2022-3510 by sending non-repeated embedded messages with repeated or unknown fields.
The severity of CVE-2022-3510 is medium with a CVSS score of 5.7.
Protobuf-java versions 3.21.7, 3.20.3, 3.19.6, and 3.16.3 are affected by CVE-2022-3510.
To fix CVE-2022-3510, update protobuf-java to version 3.21.7 or apply the appropriate remedy provided by the vendor.