An issue in protobuf-java allowed the interleaving of com.google.protobuf.UnknownFieldSet fields in such a way that would be processed out of order. A small malicious payload can occupy the parser for several minutes by creating large numbers of short-lived objects that cause frequent, repeated pauses. We recommend upgrading libraries beyond the vulnerable versions.
The product performs multiple related behaviors, but the behaviors are performed in the wrong order in ways which may produce resultant weaknesses.
Link | Tags |
---|---|
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=39330 | issue tracking mailing list vendor advisory exploit |
https://cloud.google.com/support/bulletins#gcp-2022-001 | vendor advisory |
http://www.openwall.com/lists/oss-security/2022/01/12/4 | third party advisory mailing list |
http://www.openwall.com/lists/oss-security/2022/01/12/7 | third party advisory mailing list |
https://www.oracle.com/security-alerts/cpuapr2022.html | third party advisory patch |
https://lists.debian.org/debian-lts-announce/2023/04/msg00019.html | mailing list |