A parsing issue similar to CVE-2022-3171, but with textformat in protobuf-java core and lite versions prior to 3.21.7, 3.20.3, 3.19.6 and 3.16.3 can lead to a denial of service attack. Inputs containing multiple instances of non-repeated embedded messages with repeated or unknown fields causes objects to be converted back-n-forth between mutable and immutable forms, resulting in potentially long garbage collection pauses. We recommend updating to the versions mentioned above.
{
"binaries": [
{
"binary_version": "2.5.0-9ubuntu1+esm1",
"binary_name": "libprotobuf-dev"
},
{
"binary_version": "2.5.0-9ubuntu1+esm1",
"binary_name": "libprotobuf-java"
},
{
"binary_version": "2.5.0-9ubuntu1+esm1",
"binary_name": "libprotobuf-lite8"
},
{
"binary_version": "2.5.0-9ubuntu1+esm1",
"binary_name": "libprotobuf8"
},
{
"binary_version": "2.5.0-9ubuntu1+esm1",
"binary_name": "libprotoc-dev"
},
{
"binary_version": "2.5.0-9ubuntu1+esm1",
"binary_name": "libprotoc8"
},
{
"binary_version": "2.5.0-9ubuntu1+esm1",
"binary_name": "protobuf-compiler"
},
{
"binary_version": "2.5.0-9ubuntu1+esm1",
"binary_name": "python-protobuf"
}
]
}
{
"binaries": [
{
"binary_version": "2.6.1-1.3ubuntu0.1~esm4",
"binary_name": "libprotobuf-dev"
},
{
"binary_version": "2.6.1-1.3ubuntu0.1~esm4",
"binary_name": "libprotobuf-java"
},
{
"binary_version": "2.6.1-1.3ubuntu0.1~esm4",
"binary_name": "libprotobuf-lite9v5"
},
{
"binary_version": "2.6.1-1.3ubuntu0.1~esm4",
"binary_name": "libprotobuf9v5"
},
{
"binary_version": "2.6.1-1.3ubuntu0.1~esm4",
"binary_name": "libprotoc-dev"
},
{
"binary_version": "2.6.1-1.3ubuntu0.1~esm4",
"binary_name": "libprotoc9v5"
},
{
"binary_version": "2.6.1-1.3ubuntu0.1~esm4",
"binary_name": "protobuf-compiler"
},
{
"binary_version": "2.6.1-1.3ubuntu0.1~esm4",
"binary_name": "python-protobuf"
}
]
}