CVE-2024-7254

Any project that parses untrusted Protocol Buffers data containing an arbitrary number of nested groups / series of SGROUP tags can corrupted by exceeding the stack limit i.e. StackOverflow. Parsing nested groups as unknown fields with DiscardUnknownFieldsParser or Java Protobuf Lite parser, or against Protobuf map fields, creates unbounded recursions that can be abused by an attacker.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:google:protobuf:3.25.5:*:*:*:*:ruby:*:*
cpe:2.3:a:google:protobuf:4.27.5:*:*:*:*:ruby:*:*
cpe:2.3:a:google:protobuf:4.28.2:*:*:*:*:ruby:*:*
cpe:2.3:a:google:protobuf:28.2:*:*:*:*:*:*:*
cpe:2.3:a:google:protobuf-java:3.25.5:*:*:*:*:*:*:*
cpe:2.3:a:google:protobuf-java:4.27.5:*:*:*:*:*:*:*
cpe:2.3:a:google:protobuf-java:4.28.2:*:*:*:*:*:*:*
cpe:2.3:a:google:protobuf-javalite:3.25.5:*:*:*:*:*:*:*
cpe:2.3:a:google:protobuf-javalite:4.27.5:*:*:*:*:*:*:*
cpe:2.3:a:google:protobuf-javalite:4.28.2:*:*:*:*:*:*:*
cpe:2.3:a:google:protobuf-kotlin:3.25.5:*:*:*:*:*:*:*
cpe:2.3:a:google:protobuf-kotlin:4.27.5:*:*:*:*:*:*:*
cpe:2.3:a:google:protobuf-kotlin:4.28.2:*:*:*:*:*:*:*
cpe:2.3:a:google:protobuf-kotlin-lite:3.25.5:*:*:*:*:*:*:*
cpe:2.3:a:google:protobuf-kotlin-lite:4.27.5:*:*:*:*:*:*:*
cpe:2.3:a:google:protobuf-kotlin-lite:4.28.2:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:linux:*:*
cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*
cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*
cpe:2.3:a:netapp:bluexp:-:*:*:*:*:*:*:*
cpe:2.3:a:netapp:ontap_tools:10:*:*:*:*:vmware_vsphere:*:*

History

30 Jul 2025, 16:10

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.5
First Time Google protobuf-java
Netapp active Iq Unified Manager
Google protobuf-javalite
Google protobuf
Netapp bluexp
Google protobuf-kotlin
Netapp ontap Tools
Google
Google protobuf-kotlin-lite
Netapp
CWE CWE-787
References () https://github.com/protocolbuffers/protobuf/commit/cc8b3483a5584b3301e3d43d17eb59704857ffaa - () https://github.com/protocolbuffers/protobuf/commit/cc8b3483a5584b3301e3d43d17eb59704857ffaa - Patch
References () https://security.netapp.com/advisory/ntap-20241213-0010/ - () https://security.netapp.com/advisory/ntap-20241213-0010/ - Third Party Advisory
References () https://security.netapp.com/advisory/ntap-20250418-0006/ - () https://security.netapp.com/advisory/ntap-20250418-0006/ - Third Party Advisory
CPE cpe:2.3:a:google:protobuf-kotlin:4.27.5:*:*:*:*:*:*:*
cpe:2.3:a:google:protobuf-javalite:4.28.2:*:*:*:*:*:*:*
cpe:2.3:a:google:protobuf-java:3.25.5:*:*:*:*:*:*:*
cpe:2.3:a:google:protobuf-kotlin-lite:4.27.5:*:*:*:*:*:*:*
cpe:2.3:a:netapp:ontap_tools:10:*:*:*:*:vmware_vsphere:*:*
cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:linux:*:*
cpe:2.3:a:google:protobuf-kotlin:3.25.5:*:*:*:*:*:*:*
cpe:2.3:a:google:protobuf-javalite:3.25.5:*:*:*:*:*:*:*
cpe:2.3:a:google:protobuf:4.28.2:*:*:*:*:ruby:*:*
cpe:2.3:a:google:protobuf-javalite:4.27.5:*:*:*:*:*:*:*
cpe:2.3:a:netapp:bluexp:-:*:*:*:*:*:*:*
cpe:2.3:a:google:protobuf-kotlin-lite:3.25.5:*:*:*:*:*:*:*
cpe:2.3:a:google:protobuf-java:4.27.5:*:*:*:*:*:*:*
cpe:2.3:a:google:protobuf:28.2:*:*:*:*:*:*:*
cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*
cpe:2.3:a:google:protobuf-java:4.28.2:*:*:*:*:*:*:*
cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*
cpe:2.3:a:google:protobuf:4.27.5:*:*:*:*:ruby:*:*
cpe:2.3:a:google:protobuf:3.25.5:*:*:*:*:ruby:*:*
cpe:2.3:a:google:protobuf-kotlin-lite:4.28.2:*:*:*:*:*:*:*
cpe:2.3:a:google:protobuf-kotlin:4.28.2:*:*:*:*:*:*:*

19 Apr 2025, 01:15

Type Values Removed Values Added
References
  • () https://security.netapp.com/advisory/ntap-20250418-0006/ -

13 Dec 2024, 14:15

Type Values Removed Values Added
References
  • () https://security.netapp.com/advisory/ntap-20241213-0010/ -

20 Sep 2024, 12:30

Type Values Removed Values Added
Summary
  • (es) Cualquier proyecto que analice datos de Protocol Buffers no confiables que contengan una cantidad arbitraria de grupos anidados o series de etiquetas SGROUP puede corromperse si se excede el límite de la pila, es decir, StackOverflow. Analizar grupos anidados como campos desconocidos con DiscardUnknownFieldsParser o el analizador Java Protobuf Lite, o contra campos de mapa Protobuf, crea recursiones ilimitadas que pueden ser utilizadas de forma abusiva por un atacante.

19 Sep 2024, 01:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-09-19 01:15

Updated : 2025-07-30 16:10


NVD link : CVE-2024-7254

Mitre link : CVE-2024-7254

CVE.ORG link : CVE-2024-7254


JSON object : View

Products Affected

google

  • protobuf-kotlin
  • protobuf-java
  • protobuf
  • protobuf-kotlin-lite
  • protobuf-javalite

netapp

  • bluexp
  • ontap_tools
  • active_iq_unified_manager
CWE
CWE-20

Improper Input Validation

CWE-787

Out-of-bounds Write