Protobuf-c v1.4.0 was discovered to contain an invalid arithmetic shift via the function parse_tag_and_wiretype in protobuf-c/protobuf-c.c. This vulnerability allows attackers to cause a Denial of Service (DoS) via unspecified vectors.
References
Link | Resource |
---|---|
https://github.com/protobuf-c/protobuf-c/pull/508 | Exploit Issue Tracking Patch Third Party Advisory |
https://github.com/protobuf-c/protobuf-c/issues/506 | Exploit Issue Tracking Patch Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FFN2GHUEGTSHRD7J5PKQ5DRSJSEQ2IKN/ | Mailing List Third Party Advisory |
Information
Published : 2022-06-23 10:15
Updated : 2022-10-27 14:02
NVD link : CVE-2022-33070
Mitre link : CVE-2022-33070
JSON object : View
CWE
Products Affected
fedoraproject
- fedora
protobuf-c_project
- protobuf-c