Risk | Medium |
Patch available | YES |
Number of vulnerabilities | 1 |
CVE-ID | CVE-2024-7254 |
CWE-ID | CWE-674 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software |
openSUSE Leap Micro Operating systems & Components / Operating system SUSE Linux Enterprise Micro Operating systems & Components / Operating system Python 3 Module Operating systems & Components / Operating system Public Cloud Module Operating systems & Components / Operating system Development Tools Module Operating systems & Components / Operating system SUSE Package Hub 15 Operating systems & Components / Operating system Basesystem Module Operating systems & Components / Operating system SUSE Linux Enterprise Server for SAP Applications 15 Operating systems & Components / Operating system SUSE Linux Enterprise Server 15 Operating systems & Components / Operating system SUSE Linux Enterprise Real Time 15 Operating systems & Components / Operating system SUSE Linux Enterprise High Performance Computing 15 Operating systems & Components / Operating system SUSE Linux Enterprise Desktop 15 Operating systems & Components / Operating system openSUSE Leap Operating systems & Components / Operating system libprotobuf-lite25_1_0-64bit Operating systems & Components / Operating system package or component libprotobuf25_1_0-64bit-debuginfo Operating systems & Components / Operating system package or component libprotobuf-lite25_1_0-64bit-debuginfo Operating systems & Components / Operating system package or component libprotoc25_1_0-64bit Operating systems & Components / Operating system package or component libprotobuf25_1_0-64bit Operating systems & Components / Operating system package or component libprotoc25_1_0-64bit-debuginfo Operating systems & Components / Operating system package or component libprotoc25_1_0-32bit-debuginfo Operating systems & Components / Operating system package or component libprotobuf-lite25_1_0-32bit Operating systems & Components / Operating system package or component libprotobuf25_1_0-32bit-debuginfo Operating systems & Components / Operating system package or component libprotobuf25_1_0-32bit Operating systems & Components / Operating system package or component libprotobuf-lite25_1_0-32bit-debuginfo Operating systems & Components / Operating system package or component libprotoc25_1_0-32bit Operating systems & Components / Operating system package or component protobuf-java Operating systems & Components / Operating system package or component protobuf-devel Operating systems & Components / Operating system package or component libprotoc25_1_0 Operating systems & Components / Operating system package or component libprotobuf-lite25_1_0-debuginfo Operating systems & Components / Operating system package or component protobuf-debugsource Operating systems & Components / Operating system package or component libprotobuf-lite25_1_0 Operating systems & Components / Operating system package or component protobuf-devel-debuginfo Operating systems & Components / Operating system package or component libprotobuf25_1_0-debuginfo Operating systems & Components / Operating system package or component python311-protobuf Operating systems & Components / Operating system package or component libprotoc25_1_0-debuginfo Operating systems & Components / Operating system package or component libprotobuf25_1_0 Operating systems & Components / Operating system package or component |
Vendor | SUSE |
Security Bulletin
This security bulletin contains one medium risk vulnerability.
EUVDB-ID: #VU97574
Risk: Medium
CVSSv4.0: 6.6 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2024-7254
CWE-ID:
CWE-674 - Uncontrolled Recursion
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation when parsing nested groups as unknown fields with DiscardUnknownFieldsParser or Java Protobuf Lite parser, or against Protobuf map fields. A remote attacker can pass specially crafted input to the application to create unbounded recursions and perform a denial of service (DoS) attack.
Update the affected package protobuf to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
Python 3 Module: 15-SP5
Public Cloud Module: 15-SP5
Development Tools Module: 15-SP5
SUSE Package Hub 15: 15-SP5
Basesystem Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
openSUSE Leap: 15.5
libprotobuf-lite25_1_0-64bit: before 25.1-150500.12.5.1
libprotobuf25_1_0-64bit-debuginfo: before 25.1-150500.12.5.1
libprotobuf-lite25_1_0-64bit-debuginfo: before 25.1-150500.12.5.1
libprotoc25_1_0-64bit: before 25.1-150500.12.5.1
libprotobuf25_1_0-64bit: before 25.1-150500.12.5.1
libprotoc25_1_0-64bit-debuginfo: before 25.1-150500.12.5.1
libprotoc25_1_0-32bit-debuginfo: before 25.1-150500.12.5.1
libprotobuf-lite25_1_0-32bit: before 25.1-150500.12.5.1
libprotobuf25_1_0-32bit-debuginfo: before 25.1-150500.12.5.1
libprotobuf25_1_0-32bit: before 25.1-150500.12.5.1
libprotobuf-lite25_1_0-32bit-debuginfo: before 25.1-150500.12.5.1
libprotoc25_1_0-32bit: before 25.1-150500.12.5.1
protobuf-java: before 25.1-150500.12.5.1
protobuf-devel: before 25.1-150500.12.5.1
libprotoc25_1_0: before 25.1-150500.12.5.1
libprotobuf-lite25_1_0-debuginfo: before 25.1-150500.12.5.1
protobuf-debugsource: before 25.1-150500.12.5.1
libprotobuf-lite25_1_0: before 25.1-150500.12.5.1
protobuf-devel-debuginfo: before 25.1-150500.12.5.1
libprotobuf25_1_0-debuginfo: before 25.1-150500.12.5.1
python311-protobuf: before 4.25.1-150500.12.5.1
libprotoc25_1_0-debuginfo: before 25.1-150500.12.5.1
libprotobuf25_1_0: before 25.1-150500.12.5.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243747-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.