openEuler 24.03 LTS update for protobuf



Risk Medium
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2024-7254
CWE-ID CWE-674
Exploitation vector Network
Public exploit N/A
Vulnerable software
openEuler
Operating systems & Components / Operating system

python3-protobuf
Operating systems & Components / Operating system package or component

protobuf-parent
Operating systems & Components / Operating system package or component

protobuf-javalite
Operating systems & Components / Operating system package or component

protobuf-javadoc
Operating systems & Components / Operating system package or component

protobuf-java-util
Operating systems & Components / Operating system package or component

protobuf-java
Operating systems & Components / Operating system package or component

protobuf-bom
Operating systems & Components / Operating system package or component

protobuf-lite-devel
Operating systems & Components / Operating system package or component

protobuf-lite
Operating systems & Components / Operating system package or component

protobuf-devel
Operating systems & Components / Operating system package or component

protobuf-debugsource
Operating systems & Components / Operating system package or component

protobuf-debuginfo
Operating systems & Components / Operating system package or component

protobuf-compiler
Operating systems & Components / Operating system package or component

protobuf
Operating systems & Components / Operating system package or component

Vendor openEuler

Security Bulletin

This security bulletin contains one medium risk vulnerability.

1) Uncontrolled Recursion

EUVDB-ID: #VU97574

Risk: Medium

CVSSv4.0: 6.6 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]

CVE-ID: CVE-2024-7254

CWE-ID: CWE-674 - Uncontrolled Recursion

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation when parsing nested groups as unknown fields with DiscardUnknownFieldsParser or Java Protobuf Lite parser, or against Protobuf map fields. A remote attacker can pass specially crafted input to the application to create unbounded recursions and perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 24.03 LTS

python3-protobuf: before 25.1-7

protobuf-parent: before 25.1-7

protobuf-javalite: before 25.1-7

protobuf-javadoc: before 25.1-7

protobuf-java-util: before 25.1-7

protobuf-java: before 25.1-7

protobuf-bom: before 25.1-7

protobuf-lite-devel: before 25.1-7

protobuf-lite: before 25.1-7

protobuf-devel: before 25.1-7

protobuf-debugsource: before 25.1-7

protobuf-debuginfo: before 25.1-7

protobuf-compiler: before 25.1-7

protobuf: before 25.1-7

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1144


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###