An issue in protobuf-java allowed the interleaving of com.google.protobuf.UnknownFieldSet fields in such a way that would be processed out of order. A small malicious payload can occupy the parser for several minutes by creating large numbers of short-lived objects that cause frequent, repeated pauses. We recommend upgrading libraries beyond the vulnerable versions.
References
Link | Resource |
---|---|
http://www.openwall.com/lists/oss-security/2022/01/12/4 | Mailing List Third Party Advisory |
http://www.openwall.com/lists/oss-security/2022/01/12/7 | Mailing List Third Party Advisory |
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=39330 | Exploit Issue Tracking Mailing List Vendor Advisory |
https://cloud.google.com/support/bulletins#gcp-2022-001 | Vendor Advisory |
https://lists.debian.org/debian-lts-announce/2023/04/msg00019.html | |
https://www.oracle.com/security-alerts/cpuapr2022.html | Patch Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
No history.
Information
Published : 2022-01-10 14:10
Updated : 2024-02-28 18:48
NVD link : CVE-2021-22569
Mitre link : CVE-2021-22569
CVE.ORG link : CVE-2021-22569
JSON object : View
Products Affected
oracle
- communications_cloud_native_core_network_repository_function
- communications_cloud_native_core_policy
- communications_cloud_native_core_console
- spatial_and_graph_mapviewer
- protobuf-kotlin
- google-protobuf
- protobuf-java
CWE