A parsing vulnerability for the MessageSet type in the ProtocolBuffers can lead to out of memory failures. A specially crafted message with multiple key-value per elements creates parsing issues, and can lead to a Denial of Service against services receiving unsanitized input. References: https://cloud.google.com/support/bulletins#GCP-2022-019 https://github.com/protocolbuffers/protobuf/security/advisories/GHSA-8gq9-2x98-w8hf http://www.openwall.com/lists/oss-security/2022/09/27/1
Upstream fix: https://github.com/protocolbuffers/protobuf/pull/10542