CVE-2024-7254

NameCVE-2024-7254
DescriptionAny project that parses untrusted Protocol Buffers data containing an arbitrary number of nested groups / series of SGROUP tags can corrupted by exceeding the stack limit i.e. StackOverflow. Parsing nested groups as unknown fields with DiscardUnknownFieldsParser or Java Protobuf Lite parser, or against Protobuf map fields, creates unbounded recursions that can be abused by an attacker.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
Debian Bugs1082381, 1103833

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
protobuf (PTS)bullseye3.12.4-1+deb11u1vulnerable
bookworm3.21.12-3vulnerable
trixie3.21.12-10vulnerable
sid3.21.12-11fixed
rust-protobuf (PTS)trixie, bookworm, sid2.27.1-1vulnerable

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
protobufsource(unstable)3.21.12-111082381
rust-protobufsource(unstable)(unfixed)1103833

Notes

[bookworm] - protobuf <no-dsa> (Minor issue)
[bullseye] - protobuf <postponed> (Minor issue)
[bookworm] - rust-protobuf <no-dsa> (Minor issue)
https://github.com/protocolbuffers/protobuf/commit/cc8b3483a5584b3301e3d43d17eb59704857ffaa
https://rustsec.org/advisories/RUSTSEC-2024-0437.html
https://github.com/advisories/GHSA-735f-pc8j-v9w8
https://github.com/stepancheg/rust-protobuf/issues/749

Search for package or bug name: Reporting problems