CVE-2022-3510
ADVISORY - githubSummary
A parsing issue similar to CVE-2022-3171, but with Message-Type Extensions in protobuf-java core and lite versions prior to 3.21.7, 3.20.3, 3.19.6 and 3.16.3 can lead to a denial of service attack. Inputs containing multiple instances of non-repeated embedded messages with repeated or unknown fields causes objects to be converted back-n-forth between mutable and immutable forms, resulting in potentially long garbage collection pauses. We recommend updating to the versions mentioned above.
Common Weakness Enumeration (CWE)
Uncontrolled Resource Consumption
Uncontrolled Resource Consumption
Improperly Controlled Modification of Dynamically-Determined Object Attributes
NIST
3.9
CVSS SCORE
7.5highGitHub
3.9
CVSS SCORE
7.5highDebian
-
Ubuntu
3.9
CVSS SCORE
7.5mediumRed Hat
1.6
CVSS SCORE
5.3mediumChainguard
CGA-24m5-8f5h-34wq
-
Chainguard
CGA-fgmv-5mj3-v9vh
-
Chainguard
CGA-g664-j68v-pmw2
-
Chainguard
CGA-rh7m-9hc4-75h6
-
Photon
CVE-2022-3510
-
CVSS SCORE
7.5highminimos
MINI-8jhv-v524-r9h6
-