Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-7625 | A parsing issue similar to CVE-2022-3171, but with textformat in protobuf-java core and lite versions prior to 3.21.7, 3.20.3, 3.19.6 and 3.16.3 can lead to a denial of service attack. Inputs containing multiple instances of non-repeated embedded messages with repeated or unknown fields causes objects to be converted back-n-forth between mutable and immutable forms, resulting in potentially long garbage collection pauses. We recommend updating to the versions mentioned above. |
Github GHSA |
GHSA-g5ww-5jh7-63cx | Protobuf Java vulnerable to Uncontrolled Resource Consumption |
Tue, 22 Apr 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-400 | |
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: Google
Published:
Updated: 2025-04-22T15:10:13.149Z
Reserved: 2022-10-14T13:51:45.771Z
Link: CVE-2022-3509
Updated: 2024-08-03T01:14:02.398Z
Status : Modified
Published: 2022-12-12T13:15:14.607
Modified: 2025-04-22T15:15:59.683
Link: CVE-2022-3509
OpenCVE Enrichment
No data.
EUVD
Github GHSA