CARVIEW |
Select Language
HTTP/2 200
date: Sun, 12 Oct 2025 04:19:19 GMT
content-type: text/html; charset=utf-8
vary: X-PJAX, X-PJAX-Container, Turbo-Visit, Turbo-Frame, X-Requested-With,Accept-Encoding, Accept, X-Requested-With
etag: W/"6ec1addeca56f6119d512fc053e533da"
cache-control: max-age=0, private, must-revalidate
strict-transport-security: max-age=31536000; includeSubdomains; preload
x-frame-options: deny
x-content-type-options: nosniff
x-xss-protection: 0
referrer-policy: origin-when-cross-origin, strict-origin-when-cross-origin
content-security-policy: default-src 'none'; base-uri 'self'; child-src github.githubassets.com github.com/assets-cdn/worker/ github.com/assets/ gist.github.com/assets-cdn/worker/; connect-src 'self' uploads.github.com www.githubstatus.com collector.github.com raw.githubusercontent.com api.github.com github-cloud.s3.amazonaws.com github-production-repository-file-5c1aeb.s3.amazonaws.com github-production-upload-manifest-file-7fdce7.s3.amazonaws.com github-production-user-asset-6210df.s3.amazonaws.com *.rel.tunnels.api.visualstudio.com wss://*.rel.tunnels.api.visualstudio.com github.githubassets.com objects-origin.githubusercontent.com copilot-proxy.githubusercontent.com proxy.individual.githubcopilot.com proxy.business.githubcopilot.com proxy.enterprise.githubcopilot.com *.actions.githubusercontent.com wss://*.actions.githubusercontent.com productionresultssa0.blob.core.windows.net/ productionresultssa1.blob.core.windows.net/ productionresultssa2.blob.core.windows.net/ productionresultssa3.blob.core.windows.net/ productionresultssa4.blob.core.windows.net/ productionresultssa5.blob.core.windows.net/ productionresultssa6.blob.core.windows.net/ productionresultssa7.blob.core.windows.net/ productionresultssa8.blob.core.windows.net/ productionresultssa9.blob.core.windows.net/ productionresultssa10.blob.core.windows.net/ productionresultssa11.blob.core.windows.net/ productionresultssa12.blob.core.windows.net/ productionresultssa13.blob.core.windows.net/ productionresultssa14.blob.core.windows.net/ productionresultssa15.blob.core.windows.net/ productionresultssa16.blob.core.windows.net/ productionresultssa17.blob.core.windows.net/ productionresultssa18.blob.core.windows.net/ productionresultssa19.blob.core.windows.net/ github-production-repository-image-32fea6.s3.amazonaws.com github-production-release-asset-2e65be.s3.amazonaws.com insights.github.com wss://alive.github.com wss://alive-staging.github.com api.githubcopilot.com api.individual.githubcopilot.com api.business.githubcopilot.com api.enterprise.githubcopilot.com; font-src github.githubassets.com; form-action 'self' github.com gist.github.com copilot-workspace.githubnext.com objects-origin.githubusercontent.com; frame-ancestors 'none'; frame-src viewscreen.githubusercontent.com notebooks.githubusercontent.com; img-src 'self' data: blob: github.githubassets.com media.githubusercontent.com camo.githubusercontent.com identicons.github.com avatars.githubusercontent.com private-avatars.githubusercontent.com github-cloud.s3.amazonaws.com objects.githubusercontent.com release-assets.githubusercontent.com secured-user-images.githubusercontent.com/ user-images.githubusercontent.com/ private-user-images.githubusercontent.com opengraph.githubassets.com marketplace-screenshots.githubusercontent.com/ copilotprodattachments.blob.core.windows.net/github-production-copilot-attachments/ github-production-user-asset-6210df.s3.amazonaws.com customer-stories-feed.github.com spotlights-feed.github.com objects-origin.githubusercontent.com *.githubusercontent.com; manifest-src 'self'; media-src github.com user-images.githubusercontent.com/ secured-user-images.githubusercontent.com/ private-user-images.githubusercontent.com github-production-user-asset-6210df.s3.amazonaws.com gist.github.com; script-src github.githubassets.com; style-src 'unsafe-inline' github.githubassets.com; upgrade-insecure-requests; worker-src github.githubassets.com github.com/assets-cdn/worker/ github.com/assets/ gist.github.com/assets-cdn/worker/
server: github.com
content-encoding: gzip
accept-ranges: bytes
set-cookie: _gh_sess=XjiLbRbc8GqI5%2FikWnUQXiPnJbNb3WXc686Yj4ynn56xQ2IrWo%2BUGJ4Hm52w3lykNsxDFIKmKl5214WR5kqcG%2F0uZUrPGkGqWfUzbCX%2FAd0HQzeFDWFCexKbp43vWP7NSCOYSRghegBM6l7Uf%2FJpUa7pOT30G5aAn5506RnLy%2FUjVC2RQSDXDadhStEYNb3Eb%2F%2F3rga52D3hhkK%2BXGZPn%2FXeVevhoipK3DbfTQt22mIWOkh7%2FddUOQihiC93IZhuw6wjoOkFmHvZkHT75AHABw%3D%3D--XSP9dQwnnC88SI5v--KbA%2BsvHedic%2F1mU5Y0Fzxg%3D%3D; Path=/; HttpOnly; Secure; SameSite=Lax
set-cookie: _octo=GH1.1.2086878597.1760242759; Path=/; Domain=github.com; Expires=Mon, 12 Oct 2026 04:19:19 GMT; Secure; SameSite=Lax
set-cookie: logged_in=no; Path=/; Domain=github.com; Expires=Mon, 12 Oct 2026 04:19:19 GMT; HttpOnly; Secure; SameSite=Lax
x-github-request-id: A612:2C8153:BD30DA:FEAF0B:68EB2C47
protobuf-java has potential Denial of Service issue · CVE-2024-7254 · GitHub Advisory Database · GitHub
Skip to content
Navigation Menu
CVE-2024-7254
{{ message }}
protobuf-java has potential Denial of Service issue
High severity
GitHub Reviewed
Published
Sep 18, 2024
in
protocolbuffers/protobuf
•
Updated Sep 10, 2025
Package
Affected versions
< 3.25.5
>= 4.0.0-RC1, < 4.27.5
>= 4.28.0-RC1, < 4.28.2
Patched versions
3.25.5
4.27.5
4.28.2
< 3.25.5
>= 4.0.0-RC1, < 4.27.5
>= 4.28.0-RC1, < 4.28.2
3.25.5
4.27.5
4.28.2
< 3.25.5
>= 4.0.0-RC1, < 4.27.5
>= 4.28.0-RC1, < 4.28.2
3.25.5
4.27.5
4.28.2
< 3.25.5
>= 4.0.0-RC1, < 4.27.5
>= 4.28.0-RC1, < 4.28.2
3.25.5
4.27.5
4.28.2
< 3.25.5
>= 4.0.0.rc.1, < 4.27.5
>= 4.28.0.rc.1, < 4.28.2
3.25.5
4.27.5
4.28.2
Description
Published by the National Vulnerability Database
Sep 19, 2024
Published to the GitHub Advisory Database
Sep 19, 2024
Reviewed
Sep 19, 2024
Last updated
Sep 10, 2025
Severity
High
/ 10
CVSS v4 base metrics
Exploitability Metrics
Attack Vector
Network
Attack Complexity
Low
Attack Requirements
None
Privileges Required
None
User interaction
None
Vulnerable System Impact Metrics
Confidentiality
None
Integrity
None
Availability
High
Subsequent System Impact Metrics
Confidentiality
None
Integrity
None
Availability
None
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
EPSS score
(25th percentile)
Weaknesses
Weakness CWE-20
Improper Input Validation
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly. Learn more on MITRE.Weakness CWE-400
Uncontrolled Resource Consumption
The product does not properly control the allocation and maintenance of a limited resource, thereby enabling an actor to influence the amount of resources consumed, eventually leading to the exhaustion of available resources. Learn more on MITRE.Weakness CWE-787
Out-of-bounds Write
The product writes data past the end, or before the beginning, of the intended buffer. Learn more on MITRE.CVE ID
CVE-2024-7254
GHSA ID
GHSA-735f-pc8j-v9w8
Source code
Credits
-
anlakii Analyst
Loading
Checking history
See something to contribute?
Suggest improvements for this vulnerability.
You can’t perform that action at this time.
Summary
When parsing unknown fields in the Protobuf Java Lite and Full library, a maliciously crafted message can cause a StackOverflow error and lead to a program crash.
Reporter: Alexis Challande, Trail of Bits Ecosystem Security Team ecosystem@trailofbits.com
Affected versions: This issue affects all versions of both the Java full and lite Protobuf runtimes, as well as Protobuf for Kotlin and JRuby, which themselves use the Java Protobuf runtime.
Severity
CVE-2024-7254 High CVSS4.0 Score 8.7 (NOTE: there may be a delay in publication)
This is a potential Denial of Service. Parsing nested groups as unknown fields with DiscardUnknownFieldsParser or Java Protobuf Lite parser, or against Protobuf map fields, creates unbounded recursions that can be abused by an attacker.
Proof of Concept
For reproduction details, please refer to the unit tests (Protobuf Java LiteTest and CodedInputStreamTest) that identify the specific inputs that exercise this parsing weakness.
Remediation and Mitigation
We have been working diligently to address this issue and have released a mitigation that is available now. Please update to the latest available versions of the following packages:
References