Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2022-3510

Опубликовано: 15 дек. 2022
Источник: redhat
CVSS3: 5.3
EPSS Низкий

Описание

A parsing issue similar to CVE-2022-3171, but with Message-Type Extensions in protobuf-java core and lite versions prior to 3.21.7, 3.20.3, 3.19.6 and 3.16.3 can lead to a denial of service attack. Inputs containing multiple instances of non-repeated embedded messages with repeated or unknown fields causes objects to be converted back-n-forth between mutable and immutable forms, resulting in potentially long garbage collection pauses. We recommend updating to the versions mentioned above.

A flaw was found in Message-Type Extensions in protobuf-java core that can lead to a denial of service. Inputs containing multiple instances of non-repeated embedded messages with repeated or unknown fields can cause objects to convert between mutable and immutable forms, resulting in long garbage collection pauses.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
A-MQ Clients 2protobuf-javaNot affected
Logging Subsystem for Red Hat OpenShiftopenshift-logging/elasticsearch6-rhel8Not affected
Migration Toolkit for Applications 6org.keycloak-keycloak-parentWill not fix
Migration Toolkit for Runtimesorg.keycloak-keycloak-parentWill not fix
OpenShift Developer Tools and Servicesjenkins-2-pluginsNot affected
Red Hat build of Debezium 1protobuf-javaAffected
Red Hat build of Quarkusprotobuf-javaNot affected
Red Hat Data Grid 8protobuf-javaOut of support scope
Red Hat Decision Manager 7protobuf-javaOut of support scope
Red Hat Enterprise Linux 8protobufNot affected

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-915
https://bugzilla.redhat.com/show_bug.cgi?id=2184176protobuf-java: Message-Type Extensions parsing issue leads to DoS

EPSS

Процентиль: 22%
0.00073
Низкий

5.3 Medium

CVSS3

Связанные уязвимости

CVSS3: 7.5
ubuntu
около 3 лет назад

A parsing issue similar to CVE-2022-3171, but with Message-Type Extensions in protobuf-java core and lite versions prior to 3.21.7, 3.20.3, 3.19.6 and 3.16.3 can lead to a denial of service attack. Inputs containing multiple instances of non-repeated embedded messages with repeated or unknown fields causes objects to be converted back-n-forth between mutable and immutable forms, resulting in potentially long garbage collection pauses. We recommend updating to the versions mentioned above.

CVSS3: 7.5
nvd
около 3 лет назад

A parsing issue similar to CVE-2022-3171, but with Message-Type Extensions in protobuf-java core and lite versions prior to 3.21.7, 3.20.3, 3.19.6 and 3.16.3 can lead to a denial of service attack. Inputs containing multiple instances of non-repeated embedded messages with repeated or unknown fields causes objects to be converted back-n-forth between mutable and immutable forms, resulting in potentially long garbage collection pauses. We recommend updating to the versions mentioned above.

msrc
5 месяцев назад

Parsing issue in protobuf message-type extension

CVSS3: 7.5
debian
около 3 лет назад

A parsing issue similar to CVE-2022-3171, but with Message-Type Extens ...

CVSS3: 7.5
github
около 3 лет назад

Protobuf Java vulnerable to Uncontrolled Resource Consumption

EPSS

Процентиль: 22%
0.00073
Низкий

5.3 Medium

CVSS3