An issue in protobuf-java allowed the interleaving of com.google.protobuf.UnknownFieldSet fields in such a way that would be processed out of order. A small malicious payload can occupy the parser for several minutes by creating large numbers of short-lived objects that cause frequent, repeated pauses. We recommend upgrading libraries beyond the vulnerable versions.
References
Link | Resource |
---|---|
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=39330 | Exploit Issue Tracking Mailing List Vendor Advisory |
https://cloud.google.com/support/bulletins#gcp-2022-001 | Vendor Advisory |
http://www.openwall.com/lists/oss-security/2022/01/12/4 | Mailing List Third Party Advisory |
http://www.openwall.com/lists/oss-security/2022/01/12/7 | Mailing List Third Party Advisory |
https://www.oracle.com/security-alerts/cpuapr2022.html | Patch Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Information
Published : 2022-01-10 06:10
Updated : 2022-05-10 11:03
NVD link : CVE-2021-22569
Mitre link : CVE-2021-22569
JSON object : View
CWE
Products Affected
- protobuf-kotlin
- protobuf-java
- google-protobuf
oracle
- communications_cloud_native_core_network_repository_function
- communications_cloud_native_core_console
- spatial_and_graph_mapviewer
- communications_cloud_native_core_policy