CVE-2022-33070

Protobuf-c v1.4.0 was discovered to contain an invalid arithmetic shift via the function parse_tag_and_wiretype in protobuf-c/protobuf-c.c. This vulnerability allows attackers to cause a Denial of Service (DoS) via unspecified vectors.
References
Link Resource
https://github.com/protobuf-c/protobuf-c/pull/508 Exploit Issue Tracking Patch Third Party Advisory
https://github.com/protobuf-c/protobuf-c/issues/506 Exploit Issue Tracking Patch Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FFN2GHUEGTSHRD7J5PKQ5DRSJSEQ2IKN/ Mailing List Third Party Advisory
Advertisement

NeevaHost hosting service

Configurations

Configuration 1 (hide)

cpe:2.3:a:protobuf-c_project:protobuf-c:1.4.0:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*

Information

Published : 2022-06-23 10:15

Updated : 2022-10-27 14:02


NVD link : CVE-2022-33070

Mitre link : CVE-2022-33070


JSON object : View

Advertisement

dedicated server usa

Products Affected

fedoraproject

  • fedora

protobuf-c_project

  • protobuf-c