Debian Protobuf vulnerabilities
11 known vulnerabilities affecting debian/protobuf.
Total CVEs
11
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
HIGH5MEDIUM4LOW2
Vulnerabilities
Page 1 of 1
CVE-2026-0994HIGHCVSS 8.22026
CVE-2026-0994 [HIGH] CVE-2026-0994: protobuf - A denial-of-service (DoS) vulnerability exists in google.protobuf.json_format.Pa...
A denial-of-service (DoS) vulnerability exists in google.protobuf.json_format.ParseDict() in Python, where the max_recursion_depth limit can be bypassed when parsing nested google.protobuf.Any messages. Due to missing recursion depth accounting inside the internal Any-handling logic, an attacker can supply deeply nested Any structures that bypass the intended recursi
debian
CVE-2025-4565HIGHCVSS 8.2fixed in protobuf 3.21.12-12 (forky)2025
CVE-2025-4565 [HIGH] CVE-2025-4565: protobuf - Any project that uses Protobuf Pure-Python backend to parse untrusted Protocol B...
Any project that uses Protobuf Pure-Python backend to parse untrusted Protocol Buffers data containing an arbitrary number of recursive groups, recursive messages or a series of SGROUP tags can be corrupted by exceeding the Python recursion limit. This can result in a Denial of service by crashing the application with a RecursionError. We recommend upgrading to versi
debian
CVE-2024-7254HIGHCVSS 8.7fixed in protobuf 3.21.12-12 (forky)2024
CVE-2024-7254 [HIGH] CVE-2024-7254: protobuf - Any project that parses untrusted Protocol Buffers data containing an arbitrary ...
Any project that parses untrusted Protocol Buffers data containing an arbitrary number of nested groups / series of SGROUP tags can corrupted by exceeding the stack limit i.e. StackOverflow. Parsing nested groups as unknown fields with DiscardUnknownFieldsParser or Java Protobuf Lite parser, or against Protobuf map fields, creates unbounded recursions that can be abu
debian
CVE-2024-2410LOWCVSS 7.62024
CVE-2024-2410 [HIGH] CVE-2024-2410: protobuf - The JsonToBinaryStream() function is part of the protocol buffers C++ implementa...
The JsonToBinaryStream() function is part of the protocol buffers C++ implementation and is used to parse JSON from a stream. If the input is broken up into separate chunks in a certain way, the parser will attempt to read bytes from a chunk that has already been freed.
Scope: local
bookworm: resolved
bullseye: resolved
forky: resolved
sid: resolved
trixie: resolved
debian
CVE-2022-1941HIGHCVSS 7.5fixed in protobuf 3.21.9-3 (bookworm)2022
CVE-2022-1941 [HIGH] CVE-2022-1941: protobuf - A parsing vulnerability for the MessageSet type in the ProtocolBuffers versions ...
A parsing vulnerability for the MessageSet type in the ProtocolBuffers versions prior to and including 3.16.1, 3.17.3, 3.18.2, 3.19.4, 3.20.1 and 3.21.5 for protobuf-cpp, and versions prior to and including 3.16.1, 3.17.3, 3.18.2, 3.19.4, 3.20.1 and 4.21.5 for protobuf-python can lead to out of memory failures. A specially crafted message with multiple key-value per
debian
CVE-2022-3171MEDIUMCVSS 4.3fixed in protobuf 3.21.9-3 (bookworm)2022
CVE-2022-3171 [MEDIUM] CVE-2022-3171: protobuf - A parsing issue with binary data in protobuf-java core and lite versions prior t...
A parsing issue with binary data in protobuf-java core and lite versions prior to 3.21.7, 3.20.3, 3.19.6 and 3.16.3 can lead to a denial of service attack. Inputs containing multiple instances of non-repeated embedded messages with repeated or unknown fields causes objects to be converted back-n-forth between mutable and immutable forms, resulting in potentially lo
debian
CVE-2022-3510MEDIUMCVSS 4.3fixed in protobuf 3.21.9-3 (bookworm)2022
CVE-2022-3510 [MEDIUM] CVE-2022-3510: protobuf - A parsing issue similar to CVE-2022-3171, but with Message-Type Extensions in pr...
A parsing issue similar to CVE-2022-3171, but with Message-Type Extensions in protobuf-java core and lite versions prior to 3.21.7, 3.20.3, 3.19.6 and 3.16.3 can lead to a denial of service attack. Inputs containing multiple instances of non-repeated embedded messages with repeated or unknown fields causes objects to be converted back-n-forth between mutable and im
debian
CVE-2022-3509MEDIUMCVSS 4.3fixed in protobuf 3.21.9-3 (bookworm)2022
CVE-2022-3509 [MEDIUM] CVE-2022-3509: protobuf - A parsing issue similar to CVE-2022-3171, but with textformat in protobuf-java c...
A parsing issue similar to CVE-2022-3171, but with textformat in protobuf-java core and lite versions prior to 3.21.7, 3.20.3, 3.19.6 and 3.16.3 can lead to a denial of service attack. Inputs containing multiple instances of non-repeated embedded messages with repeated or unknown fields causes objects to be converted back-n-forth between mutable and immutable forms
debian
CVE-2021-22569HIGHCVSS 7.5fixed in protobuf 3.21.9-3 (bookworm)2021
CVE-2021-22569 [HIGH] CVE-2021-22569: protobuf - An issue in protobuf-java allowed the interleaving of com.google.protobuf.Unknow...
An issue in protobuf-java allowed the interleaving of com.google.protobuf.UnknownFieldSet fields in such a way that would be processed out of order. A small malicious payload can occupy the parser for several minutes by creating large numbers of short-lived objects that cause frequent, repeated pauses. We recommend upgrading libraries beyond the vulnerable versions
debian
CVE-2021-22570MEDIUMCVSS 6.5fixed in protobuf 3.21.9-3 (bookworm)2021
CVE-2021-22570 [MEDIUM] CVE-2021-22570: protobuf - Nullptr dereference when a null char is present in a proto symbol. The symbol is...
Nullptr dereference when a null char is present in a proto symbol. The symbol is parsed incorrectly, leading to an unchecked call into the proto file's name during generation of the resulting error message. Since the symbol is incorrectly parsed, the file is nullptr. We recommend upgrading to version 3.15.0 or greater.
Scope: local
bookworm: resolved (fixed in 3.
debian
CVE-2015-5237LOWCVSS 8.82015
CVE-2015-5237 [HIGH] CVE-2015-5237: protobuf - protobuf allows remote authenticated attackers to cause a heap-based buffer over...
protobuf allows remote authenticated attackers to cause a heap-based buffer overflow.
Scope: local
bookworm: open
bullseye: open
forky: open
sid: open
trixie: open
debian