Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:deb/debian/protobuf@3.12.4-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/protobuf@3.12.4-1%2Bdeb11u1?distro=trixie
Next non-vulnerable version 3.21.9-3
Latest non-vulnerable version 3.21.12-15
Risk 4.0
Vulnerabilities affecting this package (5)
Vulnerability Summary Fixed by
VCID-4rvj-nz7h-m7ek
Aliases:
CVE-2024-7254
GHSA-735f-pc8j-v9w8
protobuf-java has potential Denial of Service issue ### Summary When parsing unknown fields in the Protobuf Java Lite and Full library, a maliciously crafted message can cause a StackOverflow error and lead to a program crash. Reporter: Alexis Challande, Trail of Bits Ecosystem Security Team <ecosystem@trailofbits.com> Affected versions: This issue affects all versions of both the Java full and lite Protobuf runtimes, as well as Protobuf for Kotlin and JRuby, which themselves use the Java Protobuf runtime. ### Severity [CVE-2024-7254](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7254) **High** CVSS4.0 Score 8.7 (NOTE: there may be a delay in publication) This is a potential Denial of Service. Parsing nested groups as unknown fields with DiscardUnknownFieldsParser or Java Protobuf Lite parser, or against Protobuf map fields, creates unbounded recursions that can be abused by an attacker. ### Proof of Concept For reproduction details, please refer to the unit tests (Protobuf Java [LiteTest](https://github.com/protocolbuffers/protobuf/blob/a037f28ff81ee45ebe008c64ab632bf5372242ce/java/lite/src/test/java/com/google/protobuf/LiteTest.java) and [CodedInputStreamTest](https://github.com/protocolbuffers/protobuf/blob/a037f28ff81ee45ebe008c64ab632bf5372242ce/java/core/src/test/java/com/google/protobuf/CodedInputStreamTest.java)) that identify the specific inputs that exercise this parsing weakness. ### Remediation and Mitigation We have been working diligently to address this issue and have released a mitigation that is available now. Please update to the latest available versions of the following packages: * protobuf-java (3.25.5, 4.27.5, 4.28.2) * protobuf-javalite (3.25.5, 4.27.5, 4.28.2) * protobuf-kotlin (3.25.5, 4.27.5, 4.28.2) * protobuf-kotlin-lite (3.25.5, 4.27.5, 4.28.2) * com-protobuf [JRuby gem only] (3.25.5, 4.27.5, 4.28.2)
3.21.12-12
Affected by 0 other vulnerabilities.
3.21.12-15
Affected by 0 other vulnerabilities.
VCID-bm8g-3tja-rbgg
Aliases:
CVE-2022-3171
GHSA-h4h5-3hr4-j3g2
GMS-2022-4942
GMS-2022-4943
GMS-2022-4944
GMS-2022-4945
GMS-2022-5022
A vulnerability has been discovered in protobuf-java which could result in denial of service.
3.21.9-3
Affected by 0 other vulnerabilities.
3.21.12-3
Affected by 2 other vulnerabilities.
3.21.12-11
Affected by 2 other vulnerabilities.
3.21.12-15
Affected by 0 other vulnerabilities.
VCID-f7bp-rkuk-9qfn
Aliases:
CVE-2022-3510
GHSA-4gg5-vx3j-xwc7
A vulnerability has been discovered in protobuf-java which could result in denial of service.
3.21.9-3
Affected by 0 other vulnerabilities.
3.21.12-3
Affected by 2 other vulnerabilities.
3.21.12-11
Affected by 2 other vulnerabilities.
3.21.12-15
Affected by 0 other vulnerabilities.
VCID-hwx9-7pf9-ryce
Aliases:
CVE-2025-4565
GHSA-8qvm-5x2c-j2w7
protobuf-python has a potential Denial of Service issue ### Summary Any project that uses Protobuf pure-Python backend to parse untrusted Protocol Buffers data containing an arbitrary number of **recursive groups**, **recursive messages** or **a series of [`SGROUP`](https://protobuf.dev/programming-guides/encoding/#groups) tags** can be corrupted by exceeding the Python recursion limit. Reporter: Alexis Challande, Trail of Bits Ecosystem Security Team [ecosystem@trailofbits.com](mailto:ecosystem@trailofbits.com) Affected versions: This issue only affects the [pure-Python implementation](https://github.com/protocolbuffers/protobuf/tree/main/python#implementation-backends) of protobuf-python backend. This is the implementation when `PROTOCOL_BUFFERS_PYTHON_IMPLEMENTATION=python` environment variable is set or the default when protobuf is used from Bazel or pure-Python PyPi wheels. CPython PyPi wheels do not use pure-Python by default. This is a Python variant of a [previous issue affecting protobuf-java](https://github.com/protocolbuffers/protobuf/security/advisories/GHSA-735f-pc8j-v9w8). ### Severity This is a potential Denial of Service. Parsing nested protobuf data creates unbounded recursions that can be abused by an attacker. ### Proof of Concept For reproduction details, please refer to the unit tests [decoder_test.py](https://github.com/protocolbuffers/protobuf/blob/main/python/google/protobuf/internal/decoder_test.py#L87-L98) and [message_test](https://github.com/protocolbuffers/protobuf/blob/main/python/google/protobuf/internal/message_test.py#L1436-L1478) ### Remediation and Mitigation A mitigation is available now. Please update to the latest available versions of the following packages: * protobuf-python(4.25.8, 5.29.5, 6.31.1)
3.21.12-12
Affected by 0 other vulnerabilities.
3.21.12-15
Affected by 0 other vulnerabilities.
VCID-kkrb-cyzz-8qbn
Aliases:
CVE-2022-3509
GHSA-g5ww-5jh7-63cx
A vulnerability has been discovered in protobuf-java which could result in denial of service.
3.21.9-3
Affected by 0 other vulnerabilities.
3.21.12-3
Affected by 2 other vulnerabilities.
3.21.12-11
Affected by 2 other vulnerabilities.
3.21.12-15
Affected by 0 other vulnerabilities.
Vulnerabilities fixed by this package (4)
Vulnerability Summary Aliases
VCID-bzax-ps8n-s7ge Duplicate This advisory duplicates another. CVE-2021-22569
GHSA-wrvw-hg22-4m67
GMS-2022-1
GMS-2022-5
GMS-2022-6
VCID-gy1m-hnpv-23e3 protobuf: Use-after-free in JsonToBinaryStream() CVE-2024-2410
VCID-r3jf-wsh1-f3gb A vulnerability has been discovered in protobuf and protobuf-python, which can lead to a denial of service. CVE-2022-1941
GHSA-8gq9-2x98-w8hf
VCID-uc1w-7er3-x7gb Nullptr dereference when a null char is present in a proto symbol. The symbol is parsed incorrectly, leading to an unchecked call into the proto file's name during generation of the resulting error message. Since the symbol is incorrectly parsed, the file is nullptr. We recommend upgrading to version 3.15.0 or greater. CVE-2021-22570
GHSA-77rm-9x9h-xj3g
PYSEC-2022-48

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-16T12:54:31.699583+00:00 Debian Importer Fixing VCID-uc1w-7er3-x7gb https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:00:35.556904+00:00 Debian Importer Fixing VCID-bzax-ps8n-s7ge https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:23:41.107508+00:00 Debian Importer Fixing VCID-r3jf-wsh1-f3gb https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:13:33.987109+00:00 Debian Importer Fixing VCID-gy1m-hnpv-23e3 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-13T08:51:46.443303+00:00 Debian Importer Fixing VCID-uc1w-7er3-x7gb https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:12:07.200662+00:00 Debian Importer Fixing VCID-bzax-ps8n-s7ge https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:16:19.197541+00:00 Debian Importer Fixing VCID-r3jf-wsh1-f3gb https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:10:16.048845+00:00 Debian Importer Fixing VCID-gy1m-hnpv-23e3 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-03T07:50:23.174152+00:00 Debian Importer Affected by VCID-hwx9-7pf9-ryce https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:50:23.126864+00:00 Debian Importer Affected by VCID-4rvj-nz7h-m7ek https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:50:23.096079+00:00 Debian Importer Fixing VCID-gy1m-hnpv-23e3 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:50:23.033738+00:00 Debian Importer Affected by VCID-f7bp-rkuk-9qfn https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:50:22.987512+00:00 Debian Importer Affected by VCID-kkrb-cyzz-8qbn https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:50:22.941588+00:00 Debian Importer Affected by VCID-bm8g-3tja-rbgg https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:50:22.914228+00:00 Debian Importer Fixing VCID-r3jf-wsh1-f3gb https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:50:22.874143+00:00 Debian Importer Fixing VCID-uc1w-7er3-x7gb https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:50:22.831791+00:00 Debian Importer Fixing VCID-bzax-ps8n-s7ge https://security-tracker.debian.org/tracker/data/json 38.1.0