Protobuf-c v1.4.0 was discovered to contain an invalid arithmetic shift via the function parse_tag_and_wiretype in protobuf-c/protobuf-c.c. This vulnerability allows attackers to cause a Denial of Service (DoS) via unspecified vectors.
References
Link | Resource |
---|---|
https://github.com/protobuf-c/protobuf-c/issues/506 | Exploit Issue Tracking Patch Third Party Advisory |
https://github.com/protobuf-c/protobuf-c/pull/508 | Exploit Issue Tracking Patch Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FFN2GHUEGTSHRD7J5PKQ5DRSJSEQ2IKN/ |
Configurations
History
No history.
Information
Published : 2022-06-23 17:15
Updated : 2023-11-07 03:48
NVD link : CVE-2022-33070
Mitre link : CVE-2022-33070
CVE.ORG link : CVE-2022-33070
JSON object : View
Products Affected
fedoraproject
- fedora
protobuf-c_project
- protobuf-c
CWE