vulnerability
Amazon Linux 2023: CVE-2022-33070: Low priority package update for protobuf-c
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
3 | (AV:N/AC:H/Au:N/C:N/I:N/A:P) | 06/23/2022 | 02/17/2025 | 02/17/2025 |
Severity
3
CVSS
(AV:N/AC:H/Au:N/C:N/I:N/A:P)
Published
06/23/2022
Added
02/17/2025
Modified
02/17/2025
Description
Protobuf-c v1.4.0 was discovered to contain an invalid arithmetic shift via the function parse_tag_and_wiretype in protobuf-c/protobuf-c.c. This vulnerability allows attackers to cause a Denial of Service (DoS) via unspecified vectors.
A flaw was found in protobuf-c. The issue occurs due to an invalid arithmetic shift via the parse_tag_and_wiretype in the protobuf-c/protobuf-c.c function. This flaw allows attackers to cause a denial of service (DoS) via unspecified vectors.
A flaw was found in protobuf-c. The issue occurs due to an invalid arithmetic shift via the parse_tag_and_wiretype in the protobuf-c/protobuf-c.c function. This flaw allows attackers to cause a denial of service (DoS) via unspecified vectors.
Solution(s)
amazon-linux-2023-upgrade-protobuf-camazon-linux-2023-upgrade-protobuf-c-compileramazon-linux-2023-upgrade-protobuf-c-compiler-debuginfoamazon-linux-2023-upgrade-protobuf-c-debuginfoamazon-linux-2023-upgrade-protobuf-c-debugsourceamazon-linux-2023-upgrade-protobuf-c-devel

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.