Protobuf Java vulnerable to Uncontrolled Resource Consumption
High severity
GitHub Reviewed
Published
Dec 12, 2022
to the GitHub Advisory Database
•
Updated Sep 2, 2025
Package
Affected versions
>= 3.17.0, < 3.19.6
>= 3.20.0, < 3.20.3
>= 3.21.0, < 3.21.7
>= 3.0.0, < 3.16.3
Patched versions
3.19.6
3.20.3
3.21.7
3.16.3
>= 3.17.0, < 3.19.6
>= 3.20.0, < 3.20.3
>= 3.21.0, < 3.21.7
>= 3.0.0, < 3.16.3
3.19.6
3.20.3
3.21.7
3.16.3
Description
Published by the National Vulnerability Database
Dec 12, 2022
Published to the GitHub Advisory Database
Dec 12, 2022
Reviewed
Dec 12, 2022
Last updated
Sep 2, 2025
A parsing issue similar to CVE-2022-3171, but with Message-Type Extensions in protobuf-java core and lite versions prior to 3.21.7, 3.20.3, 3.19.6 and 3.16.3 can lead to a denial of service attack. Inputs containing multiple instances of non-repeated embedded messages with repeated or unknown fields causes objects to be converted back-n-forth between mutable and immutable forms, resulting in potentially long garbage collection pauses. We recommend updating to the versions mentioned above.
References