CVE-2021-22569
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
10/01/2022
Last modified:
18/04/2023
Description
An issue in protobuf-java allowed the interleaving of com.google.protobuf.UnknownFieldSet fields in such a way that would be processed out of order. A small malicious payload can occupy the parser for several minutes by creating large numbers of short-lived objects that cause frequent, repeated pauses. We recommend upgrading libraries beyond the vulnerable versions.
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Base Score 2.0
4.30
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:google:google-protobuf:*:*:*:*:*:ruby:*:* | 3.19.2 (excluding) | |
| cpe:2.3:a:google:protobuf-java:*:*:*:*:*:*:*:* | 3.16.1 (excluding) | |
| cpe:2.3:a:google:protobuf-java:*:*:*:*:*:*:*:* | 3.18.0 (including) | 3.18.2 (excluding) |
| cpe:2.3:a:google:protobuf-java:*:*:*:*:*:*:*:* | 3.19.0 (including) | 3.19.2 (excluding) |
| cpe:2.3:a:google:protobuf-kotlin:*:*:*:*:*:*:*:* | 3.18.2 (excluding) | |
| cpe:2.3:a:google:protobuf-kotlin:*:*:*:*:*:*:*:* | 3.19.0 (including) | 3.19.2 (excluding) |
| cpe:2.3:a:oracle:communications_cloud_native_core_console:1.9.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:1.15.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:1.15.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:oracle:communications_cloud_native_core_policy:1.15.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:oracle:spatial_and_graph_mapviewer:19c:*:*:*:*:*:*:* | ||
| cpe:2.3:a:oracle:spatial_and_graph_mapviewer:21c:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://www.openwall.com/lists/oss-security/2022/01/12/4
- http://www.openwall.com/lists/oss-security/2022/01/12/7
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=39330
- https://cloud.google.com/support/bulletins#gcp-2022-001
- https://lists.debian.org/debian-lts-announce/2023/04/msg00019.html
- https://www.oracle.com/security-alerts/cpuapr2022.html



