Search for packages
| purl | pkg:deb/debian/protobuf@3.21.12-11?distro=trixie |
| Next non-vulnerable version | 3.21.12-12 |
| Latest non-vulnerable version | 3.21.12-15 |
| Risk | 4.0 |
| Vulnerability | Summary | Fixed by |
|---|---|---|
|
VCID-4rvj-nz7h-m7ek
Aliases: CVE-2024-7254 GHSA-735f-pc8j-v9w8 |
protobuf-java has potential Denial of Service issue ### Summary When parsing unknown fields in the Protobuf Java Lite and Full library, a maliciously crafted message can cause a StackOverflow error and lead to a program crash. Reporter: Alexis Challande, Trail of Bits Ecosystem Security Team <ecosystem@trailofbits.com> Affected versions: This issue affects all versions of both the Java full and lite Protobuf runtimes, as well as Protobuf for Kotlin and JRuby, which themselves use the Java Protobuf runtime. ### Severity [CVE-2024-7254](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7254) **High** CVSS4.0 Score 8.7 (NOTE: there may be a delay in publication) This is a potential Denial of Service. Parsing nested groups as unknown fields with DiscardUnknownFieldsParser or Java Protobuf Lite parser, or against Protobuf map fields, creates unbounded recursions that can be abused by an attacker. ### Proof of Concept For reproduction details, please refer to the unit tests (Protobuf Java [LiteTest](https://github.com/protocolbuffers/protobuf/blob/a037f28ff81ee45ebe008c64ab632bf5372242ce/java/lite/src/test/java/com/google/protobuf/LiteTest.java) and [CodedInputStreamTest](https://github.com/protocolbuffers/protobuf/blob/a037f28ff81ee45ebe008c64ab632bf5372242ce/java/core/src/test/java/com/google/protobuf/CodedInputStreamTest.java)) that identify the specific inputs that exercise this parsing weakness. ### Remediation and Mitigation We have been working diligently to address this issue and have released a mitigation that is available now. Please update to the latest available versions of the following packages: * protobuf-java (3.25.5, 4.27.5, 4.28.2) * protobuf-javalite (3.25.5, 4.27.5, 4.28.2) * protobuf-kotlin (3.25.5, 4.27.5, 4.28.2) * protobuf-kotlin-lite (3.25.5, 4.27.5, 4.28.2) * com-protobuf [JRuby gem only] (3.25.5, 4.27.5, 4.28.2) |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. |
|
VCID-hwx9-7pf9-ryce
Aliases: CVE-2025-4565 GHSA-8qvm-5x2c-j2w7 |
protobuf-python has a potential Denial of Service issue ### Summary Any project that uses Protobuf pure-Python backend to parse untrusted Protocol Buffers data containing an arbitrary number of **recursive groups**, **recursive messages** or **a series of [`SGROUP`](https://protobuf.dev/programming-guides/encoding/#groups) tags** can be corrupted by exceeding the Python recursion limit. Reporter: Alexis Challande, Trail of Bits Ecosystem Security Team [ecosystem@trailofbits.com](mailto:ecosystem@trailofbits.com) Affected versions: This issue only affects the [pure-Python implementation](https://github.com/protocolbuffers/protobuf/tree/main/python#implementation-backends) of protobuf-python backend. This is the implementation when `PROTOCOL_BUFFERS_PYTHON_IMPLEMENTATION=python` environment variable is set or the default when protobuf is used from Bazel or pure-Python PyPi wheels. CPython PyPi wheels do not use pure-Python by default. This is a Python variant of a [previous issue affecting protobuf-java](https://github.com/protocolbuffers/protobuf/security/advisories/GHSA-735f-pc8j-v9w8). ### Severity This is a potential Denial of Service. Parsing nested protobuf data creates unbounded recursions that can be abused by an attacker. ### Proof of Concept For reproduction details, please refer to the unit tests [decoder_test.py](https://github.com/protocolbuffers/protobuf/blob/main/python/google/protobuf/internal/decoder_test.py#L87-L98) and [message_test](https://github.com/protocolbuffers/protobuf/blob/main/python/google/protobuf/internal/message_test.py#L1436-L1478) ### Remediation and Mitigation A mitigation is available now. Please update to the latest available versions of the following packages: * protobuf-python(4.25.8, 5.29.5, 6.31.1) |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. |
| Vulnerability | Summary | Aliases |
|---|---|---|
| VCID-bm8g-3tja-rbgg | A vulnerability has been discovered in protobuf-java which could result in denial of service. |
CVE-2022-3171
GHSA-h4h5-3hr4-j3g2 GMS-2022-4942 GMS-2022-4943 GMS-2022-4944 GMS-2022-4945 GMS-2022-5022 |
| VCID-bzax-ps8n-s7ge | Duplicate This advisory duplicates another. |
CVE-2021-22569
GHSA-wrvw-hg22-4m67 GMS-2022-1 GMS-2022-5 GMS-2022-6 |
| VCID-f7bp-rkuk-9qfn | A vulnerability has been discovered in protobuf-java which could result in denial of service. |
CVE-2022-3510
GHSA-4gg5-vx3j-xwc7 |
| VCID-gy1m-hnpv-23e3 | protobuf: Use-after-free in JsonToBinaryStream() |
CVE-2024-2410
|
| VCID-kkrb-cyzz-8qbn | A vulnerability has been discovered in protobuf-java which could result in denial of service. |
CVE-2022-3509
GHSA-g5ww-5jh7-63cx |
| VCID-r3jf-wsh1-f3gb | A vulnerability has been discovered in protobuf and protobuf-python, which can lead to a denial of service. |
CVE-2022-1941
GHSA-8gq9-2x98-w8hf |
| VCID-uc1w-7er3-x7gb | Nullptr dereference when a null char is present in a proto symbol. The symbol is parsed incorrectly, leading to an unchecked call into the proto file's name during generation of the resulting error message. Since the symbol is incorrectly parsed, the file is nullptr. We recommend upgrading to version 3.15.0 or greater. |
CVE-2021-22570
GHSA-77rm-9x9h-xj3g PYSEC-2022-48 |