{"id":"USN-7629-2","summary":"protobuf vulnerabilities","details":"USN-7435-1 and USN-7629-1 fixed vulnerabilities in Protocol Buffers\nfor several releases of Ubuntu. This update provides the corresponding\nfixes for Ubuntu 16.04 LTS, Ubuntu 18.04 LTS, and Ubuntu 20.04 LTS.\n\nOriginal advisory details:\n\n It was discovered that Protocol Buffers incorrectly handled memory when\n receiving malicious input using the Python bindings. An attacker could\n possibly use this issue to cause a denial of service. (CVE-2025-4565)\n\n It was discovered that Protocol Buffers incorrectly handled memory when\n receiving malicious input using the Java bindings. An attacker could\n possibly use this issue to cause a denial of service. This issue only\n affected Ubuntu 25.04. (CVE-2024-7254)","modified":"2026-02-10T04:49:34Z","published":"2025-09-02T22:03:54Z","related":["UBUNTU-CVE-2024-7254","UBUNTU-CVE-2025-4565"],"upstream":["CVE-2024-7254","CVE-2025-4565","UBUNTU-CVE-2024-7254","UBUNTU-CVE-2025-4565"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-7629-2"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-7254"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2025-4565"}],"affected":[{"package":{"name":"protobuf","ecosystem":"Ubuntu:Pro:16.04:LTS","purl":"pkg:deb/ubuntu/protobuf@2.6.1-1.3ubuntu0.1~esm4?arch=source&distro=esm-infra/xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.6.1-1.3ubuntu0.1~esm4"}]}],"versions":["2.6.1-1.2","2.6.1-1.3","2.6.1-1.3ubuntu0.1~esm1","2.6.1-1.3ubuntu0.1~esm2"],"ecosystem_specific":{"binaries":[{"binary_name":"libprotobuf-dev","binary_version":"2.6.1-1.3ubuntu0.1~esm4"},{"binary_name":"libprotobuf-java","binary_version":"2.6.1-1.3ubuntu0.1~esm4"},{"binary_name":"libprotobuf-lite9v5","binary_version":"2.6.1-1.3ubuntu0.1~esm4"},{"binary_name":"libprotobuf9v5","binary_version":"2.6.1-1.3ubuntu0.1~esm4"},{"binary_name":"libprotoc-dev","binary_version":"2.6.1-1.3ubuntu0.1~esm4"},{"binary_name":"libprotoc9v5","binary_version":"2.6.1-1.3ubuntu0.1~esm4"},{"binary_name":"protobuf-compiler","binary_version":"2.6.1-1.3ubuntu0.1~esm4"},{"binary_name":"python-protobuf","binary_version":"2.6.1-1.3ubuntu0.1~esm4"}],"availability":"Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-7629-2.json","cves_map":{"ecosystem":"Ubuntu:Pro:16.04:LTS","cves":[{"severity":[{"score":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N","type":"CVSS_V4"},{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2024-7254"},{"severity":[{"score":"CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N","type":"CVSS_V4"},{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2025-4565"}]}}},{"package":{"name":"protobuf","ecosystem":"Ubuntu:Pro:18.04:LTS","purl":"pkg:deb/ubuntu/protobuf@3.0.0-9.1ubuntu1.1+esm3?arch=source&distro=esm-infra/bionic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3.0.0-9.1ubuntu1.1+esm3"}]}],"versions":["3.0.0-9ubuntu5","3.0.0-9ubuntu6","3.0.0-9.1ubuntu1","3.0.0-9.1ubuntu1.1"],"ecosystem_specific":{"binaries":[{"binary_name":"libprotobuf-dev","binary_version":"3.0.0-9.1ubuntu1.1+esm3"},{"binary_name":"libprotobuf-java","binary_version":"3.0.0-9.1ubuntu1.1+esm3"},{"binary_name":"libprotobuf-lite10","binary_version":"3.0.0-9.1ubuntu1.1+esm3"},{"binary_name":"libprotobuf10","binary_version":"3.0.0-9.1ubuntu1.1+esm3"},{"binary_name":"libprotoc-dev","binary_version":"3.0.0-9.1ubuntu1.1+esm3"},{"binary_name":"libprotoc10","binary_version":"3.0.0-9.1ubuntu1.1+esm3"},{"binary_name":"protobuf-compiler","binary_version":"3.0.0-9.1ubuntu1.1+esm3"},{"binary_name":"python-protobuf","binary_version":"3.0.0-9.1ubuntu1.1+esm3"},{"binary_name":"python3-protobuf","binary_version":"3.0.0-9.1ubuntu1.1+esm3"}],"availability":"Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-7629-2.json","cves_map":{"ecosystem":"Ubuntu:Pro:18.04:LTS","cves":[{"severity":[{"score":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N","type":"CVSS_V4"},{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2024-7254"},{"severity":[{"score":"CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N","type":"CVSS_V4"},{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2025-4565"}]}}},{"package":{"name":"protobuf","ecosystem":"Ubuntu:Pro:20.04:LTS","purl":"pkg:deb/ubuntu/protobuf@3.6.1.3-2ubuntu5.2+esm2?arch=source&distro=esm-infra/focal"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3.6.1.3-2ubuntu5.2+esm2"}]}],"versions":["3.6.1.3-2","3.6.1.3-2ubuntu1","3.6.1.3-2ubuntu3","3.6.1.3-2ubuntu4","3.6.1.3-2ubuntu5","3.6.1.3-2ubuntu5.2"],"ecosystem_specific":{"binaries":[{"binary_name":"libprotobuf-dev","binary_version":"3.6.1.3-2ubuntu5.2+esm2"},{"binary_name":"libprotobuf-java","binary_version":"3.6.1.3-2ubuntu5.2+esm2"},{"binary_name":"libprotobuf-lite17","binary_version":"3.6.1.3-2ubuntu5.2+esm2"},{"binary_name":"libprotobuf17","binary_version":"3.6.1.3-2ubuntu5.2+esm2"},{"binary_name":"libprotoc-dev","binary_version":"3.6.1.3-2ubuntu5.2+esm2"},{"binary_name":"libprotoc17","binary_version":"3.6.1.3-2ubuntu5.2+esm2"},{"binary_name":"protobuf-compiler","binary_version":"3.6.1.3-2ubuntu5.2+esm2"},{"binary_name":"python-protobuf","binary_version":"3.6.1.3-2ubuntu5.2+esm2"},{"binary_name":"python3-protobuf","binary_version":"3.6.1.3-2ubuntu5.2+esm2"},{"binary_name":"ruby-google-protobuf","binary_version":"3.6.1.3-2ubuntu5.2+esm2"}],"availability":"Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-7629-2.json","cves_map":{"ecosystem":"Ubuntu:Pro:20.04:LTS","cves":[{"severity":[{"score":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N","type":"CVSS_V4"},{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2024-7254"},{"severity":[{"score":"CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N","type":"CVSS_V4"},{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2025-4565"}]}}}],"schema_version":"1.7.3"}