CVE-2024-7254

NameCVE-2024-7254
DescriptionAny project that parses untrusted Protocol Buffers data containing an arbitrary number of nested groups / series of SGROUP tags can corrupted by exceeding the stack limit i.e. StackOverflow. Parsing nested groups as unknown fields with DiscardUnknownFieldsParser or Java Protobuf Lite parser, or against Protobuf map fields, creates unbounded recursions that can be abused by an attacker.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
Debian Bugs1082381

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
protobuf (PTS)bullseye3.12.4-1+deb11u1vulnerable
bookworm3.21.12-3vulnerable
sid, trixie3.21.12-10vulnerable
rust-protobuf (PTS)sid, trixie, bookworm2.27.1-1vulnerable

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
protobufsource(unstable)(unfixed)1082381
rust-protobufsource(unstable)(unfixed)

Notes

[bookworm] - protobuf <no-dsa> (Minor issue)
[bullseye] - protobuf <postponed> (Minor issue)
https://github.com/protocolbuffers/protobuf/commit/cc8b3483a5584b3301e3d43d17eb59704857ffaa
https://rustsec.org/advisories/RUSTSEC-2024-0437.html
https://github.com/advisories/GHSA-735f-pc8j-v9w8
https://github.com/stepancheg/rust-protobuf/issues/749

Search for package or bug name: Reporting problems