CVE-2022-3510
Publication date 12 December 2022
Last updated 24 July 2024
Ubuntu priority
Cvss 3 Severity Score
A parsing issue similar to CVE-2022-3171, but with Message-Type Extensions in protobuf-java core and lite versions prior to 3.21.7, 3.20.3, 3.19.6 and 3.16.3 can lead to a denial of service attack. Inputs containing multiple instances of non-repeated embedded messages with repeated or unknown fields causes objects to be converted back-n-forth between mutable and immutable forms, resulting in potentially long garbage collection pauses. We recommend updating to the versions mentioned above.
Status
Package | Ubuntu Release | Status |
---|---|---|
protobuf | ||
22.04 LTS jammy | Ignored changes too intrusive | |
20.04 LTS focal | Ignored changes too intrusive | |
18.04 LTS bionic | Ignored changes too intrusive | |
16.04 LTS xenial | Ignored changes too intrusive | |
14.04 LTS trusty | Ignored changes too intrusive |
Notes
mdeslaur
The changes required to fix this issue in Ubuntu stable releases are too intrusive to be backported. We will not be releasing updates for this issue. See also CVE-2022-3171.
Severity score breakdown
Parameter | Value |
---|---|
Base score | 7.5 · High |
Attack vector | Network |
Attack complexity | Low |
Privileges required | None |
User interaction | None |
Scope | Unchanged |
Confidentiality | None |
Integrity impact | None |
Availability impact | High |
Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |