安全公告/【CVE-2022-3171】
基本信息
受影响操作系统:Asianux
危险等级:高危
影响源码包:protobuf
CVSS评分:7.5
发现日期:2022-10-31
修复版本:3.14.0-6
漏洞描述
A parsing issue with binary data in protobuf-java core and lite versions prior to 3.21.7, 3.20.3, 3.19.6 and 3.16.3 can lead to a denial of service attack. Inputs containing multiple instances of non-repeated embedded messages with repeated or unknown fields causes objects to be converted back-n-forth between mutable and immutable forms, resulting in potentially long garbage collection pauses. We recommend updating to the versions mentioned above.
修复方式
yum update PackageName
漏洞判定
执行命令yum info PackageName获取软件包版本号,版本小于修复版本,则受此漏洞影响,版本大于等于修复版本,则此漏洞已修复
参考
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3171
https://nvd.nist.gov/vuln/detail/CVE-2022-3171