Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:deb/debian/protobuf@3.21.12-3
purl pkg:deb/debian/protobuf@3.21.12-3
Next non-vulnerable version 3.21.12-15
Latest non-vulnerable version 3.21.12-15
Risk 4.0
Vulnerabilities affecting this package (2)
Vulnerability Summary Fixed by
VCID-4rvj-nz7h-m7ek
Aliases:
CVE-2024-7254
GHSA-735f-pc8j-v9w8
protobuf-java has potential Denial of Service issue ### Summary When parsing unknown fields in the Protobuf Java Lite and Full library, a maliciously crafted message can cause a StackOverflow error and lead to a program crash. Reporter: Alexis Challande, Trail of Bits Ecosystem Security Team <ecosystem@trailofbits.com> Affected versions: This issue affects all versions of both the Java full and lite Protobuf runtimes, as well as Protobuf for Kotlin and JRuby, which themselves use the Java Protobuf runtime. ### Severity [CVE-2024-7254](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7254) **High** CVSS4.0 Score 8.7 (NOTE: there may be a delay in publication) This is a potential Denial of Service. Parsing nested groups as unknown fields with DiscardUnknownFieldsParser or Java Protobuf Lite parser, or against Protobuf map fields, creates unbounded recursions that can be abused by an attacker. ### Proof of Concept For reproduction details, please refer to the unit tests (Protobuf Java [LiteTest](https://github.com/protocolbuffers/protobuf/blob/a037f28ff81ee45ebe008c64ab632bf5372242ce/java/lite/src/test/java/com/google/protobuf/LiteTest.java) and [CodedInputStreamTest](https://github.com/protocolbuffers/protobuf/blob/a037f28ff81ee45ebe008c64ab632bf5372242ce/java/core/src/test/java/com/google/protobuf/CodedInputStreamTest.java)) that identify the specific inputs that exercise this parsing weakness. ### Remediation and Mitigation We have been working diligently to address this issue and have released a mitigation that is available now. Please update to the latest available versions of the following packages: * protobuf-java (3.25.5, 4.27.5, 4.28.2) * protobuf-javalite (3.25.5, 4.27.5, 4.28.2) * protobuf-kotlin (3.25.5, 4.27.5, 4.28.2) * protobuf-kotlin-lite (3.25.5, 4.27.5, 4.28.2) * com-protobuf [JRuby gem only] (3.25.5, 4.27.5, 4.28.2)
3.21.12-15
Affected by 0 other vulnerabilities.
VCID-hwx9-7pf9-ryce
Aliases:
CVE-2025-4565
GHSA-8qvm-5x2c-j2w7
protobuf-python has a potential Denial of Service issue ### Summary Any project that uses Protobuf pure-Python backend to parse untrusted Protocol Buffers data containing an arbitrary number of **recursive groups**, **recursive messages** or **a series of [`SGROUP`](https://protobuf.dev/programming-guides/encoding/#groups) tags** can be corrupted by exceeding the Python recursion limit. Reporter: Alexis Challande, Trail of Bits Ecosystem Security Team [ecosystem@trailofbits.com](mailto:ecosystem@trailofbits.com) Affected versions: This issue only affects the [pure-Python implementation](https://github.com/protocolbuffers/protobuf/tree/main/python#implementation-backends) of protobuf-python backend. This is the implementation when `PROTOCOL_BUFFERS_PYTHON_IMPLEMENTATION=python` environment variable is set or the default when protobuf is used from Bazel or pure-Python PyPi wheels. CPython PyPi wheels do not use pure-Python by default. This is a Python variant of a [previous issue affecting protobuf-java](https://github.com/protocolbuffers/protobuf/security/advisories/GHSA-735f-pc8j-v9w8). ### Severity This is a potential Denial of Service. Parsing nested protobuf data creates unbounded recursions that can be abused by an attacker. ### Proof of Concept For reproduction details, please refer to the unit tests [decoder_test.py](https://github.com/protocolbuffers/protobuf/blob/main/python/google/protobuf/internal/decoder_test.py#L87-L98) and [message_test](https://github.com/protocolbuffers/protobuf/blob/main/python/google/protobuf/internal/message_test.py#L1436-L1478) ### Remediation and Mitigation A mitigation is available now. Please update to the latest available versions of the following packages: * protobuf-python(4.25.8, 5.29.5, 6.31.1)
3.21.12-15
Affected by 0 other vulnerabilities.
Vulnerabilities fixed by this package (3)
Vulnerability Summary Aliases
VCID-bm8g-3tja-rbgg A vulnerability has been discovered in protobuf-java which could result in denial of service. CVE-2022-3171
GHSA-h4h5-3hr4-j3g2
GMS-2022-4942
GMS-2022-4943
GMS-2022-4944
GMS-2022-4945
GMS-2022-5022
VCID-f7bp-rkuk-9qfn A vulnerability has been discovered in protobuf-java which could result in denial of service. CVE-2022-3510
GHSA-4gg5-vx3j-xwc7
VCID-kkrb-cyzz-8qbn A vulnerability has been discovered in protobuf-java which could result in denial of service. CVE-2022-3509
GHSA-g5ww-5jh7-63cx

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-16T12:14:37.970876+00:00 Debian Importer Affected by VCID-hwx9-7pf9-ryce https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:43:26.519107+00:00 Debian Importer Fixing VCID-bm8g-3tja-rbgg https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:13:40.827002+00:00 Debian Importer Affected by VCID-4rvj-nz7h-m7ek https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:48:37.841771+00:00 Debian Importer Fixing VCID-kkrb-cyzz-8qbn https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:40:02.485232+00:00 Debian Importer Fixing VCID-f7bp-rkuk-9qfn https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-13T08:22:30.217039+00:00 Debian Importer Affected by VCID-hwx9-7pf9-ryce https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:59:30.483301+00:00 Debian Importer Fixing VCID-bm8g-3tja-rbgg https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:38:05.415446+00:00 Debian Importer Affected by VCID-4rvj-nz7h-m7ek https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:19:00.622241+00:00 Debian Importer Fixing VCID-kkrb-cyzz-8qbn https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:25:57.680345+00:00 Debian Importer Fixing VCID-f7bp-rkuk-9qfn https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-08T19:34:26.298380+00:00 Debian Importer Affected by VCID-hwx9-7pf9-ryce https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:19:26.690680+00:00 Debian Importer Fixing VCID-bm8g-3tja-rbgg https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:04:25.668460+00:00 Debian Importer Affected by VCID-4rvj-nz7h-m7ek https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:51:51.818861+00:00 Debian Importer Fixing VCID-kkrb-cyzz-8qbn https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T18:09:31.376708+00:00 Debian Importer Fixing VCID-f7bp-rkuk-9qfn https://security-tracker.debian.org/tracker/data/json 38.1.0