com.google.protobuf:protobuf-kotlin@3.19.1 vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the com.google.protobuf:protobuf-kotlin package. This does not include vulnerabilities belonging to this package’s dependencies.

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for free
Vulnerability Vulnerable Version
  • M
Denial of Service (DoS)

Affected versions of this package are vulnerable to Denial of Service (DoS) via the parsing procedure for binary and text format data. Input streams containing multiple instances of non-repeated embedded messages with repeated or unknown fields cause objects to be converted back and forth between mutable and immutable forms, resulting in potentially long garbage collection pauses.

How to fix Denial of Service (DoS)?

Upgrade com.google.protobuf:protobuf-kotlin to version 3.16.3, 3.19.6, 3.20.3, 3.21.7 or higher.

[,3.16.3) [3.17.0-rc-1,3.19.6) [3.20.0-rc-1,3.20.3) [3.21.0-rc-1,3.21.7)
  • H
Denial of Service (DoS)

Affected versions of this package are vulnerable to Denial of Service (DoS). An issue in protobuf-java allowed the interleaving of com.google.protobuf.UnknownFieldSet fields in such a way that would be processed out of order. A small malicious payload can occupy the parser for several minutes by creating large numbers of short-lived objects that cause frequent, repeated pauses.

Note: Protobuf javalite users are not affected.

How to fix Denial of Service (DoS)?

Upgrade com.google.protobuf:protobuf-kotlin to version 3.18.2, 3.19.2 or higher.

[,3.18.2) [3.19.0,3.19.2)