Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

x/vulndb: potential Go vuln in github.com/protocolbuffers/protobuf: CVE-2022-3171 #1063

Closed
GoVulnBot opened this issue Oct 13, 2022 · 1 comment
Labels
excluded: NOT_GO_CODE This vulnerability does not refer to a Go module.

Comments

@GoVulnBot
Copy link

CVE-2022-3171 references github.com/protocolbuffers/protobuf, which may be a Go module.

Description:
A parsing issue with binary data in protobuf-java core and lite versions prior to 3.21.7, 3.20.3, 3.19.6 and 3.16.3 can lead to a denial of service attack. Inputs containing multiple instances of non-repeated embedded messages with repeated or unknown fields causes objects to be converted back-n-forth between mutable and immutable forms, resulting in potentially long garbage collection pauses. We recommend updating to the versions mentioned above.

References:

See doc/triage.md for instructions on how to triage this report.

modules:
  - module: github.com/protocolbuffers/protobuf
    packages:
      - package: Protocolbuffers
description: |
    A parsing issue with binary data in protobuf-java core and lite versions prior to 3.21.7, 3.20.3, 3.19.6 and 3.16.3 can lead to a denial of service attack. Inputs containing multiple instances of non-repeated embedded messages with repeated or unknown fields causes objects to be converted back-n-forth between mutable and immutable forms, resulting in potentially long garbage collection pauses. We recommend updating to the versions mentioned above.
cves:
  - CVE-2022-3171
references:
  - fix: https://github.com/protocolbuffers/protobuf/security/advisories/GHSA-h4h5-3hr4-j3g2

@neild neild added excluded: NOT_GO_CODE This vulnerability does not refer to a Go module. and removed NeedsTriage labels Oct 18, 2022
@gopherbot
Copy link
Contributor

Change https://go.dev/cl/443643 mentions this issue: data/excluded: add GO-2022-1063.yaml for CVE-2022-3171

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
excluded: NOT_GO_CODE This vulnerability does not refer to a Go module.
Projects
None yet
Development

No branches or pull requests

4 participants