{"document":{"aggregate_severity":{"namespace":"https://www.suse.com/support/security/rating/","text":"important"},"category":"csaf_security_advisory","csaf_version":"2.0","distribution":{"text":"Copyright 2024 SUSE LLC. All rights reserved.","tlp":{"label":"WHITE","url":"https://www.first.org/tlp/"}},"lang":"en","notes":[{"category":"summary","text":"Security update for protobuf","title":"Title of the patch"},{"category":"description","text":"This update for protobuf fixes the following issues:\n\n- CVE-2024-7254: Fixed a stack overflow vulnerability in protocol buffers (bsc#1230778)\n","title":"Description of the patch"},{"category":"details","text":"SUSE-SLE-Micro-6.0-91","title":"Patchnames"},{"category":"legal_disclaimer","text":"CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).","title":"Terms of use"}],"publisher":{"category":"vendor","contact_details":"https://www.suse.com/support/security/contact/","name":"SUSE Product Security Team","namespace":"https://www.suse.com/"},"references":[{"category":"external","summary":"SUSE ratings","url":"https://www.suse.com/support/security/rating/"},{"category":"self","summary":"URL of this CSAF notice","url":"https://ftp.suse.com/pub/projects/security/csaf/suse-su-2025_20074-1.json"},{"category":"self","summary":"URL for SUSE-SU-2025:20074-1","url":"https://www.suse.com/support/update/announcement/2025/suse-su-202520074-1/"},{"category":"self","summary":"E-Mail link for SUSE-SU-2025:20074-1","url":"https://lists.suse.com/pipermail/sle-security-updates/2025-June/021244.html"},{"category":"self","summary":"SUSE Bug 1230778","url":"https://bugzilla.suse.com/1230778"},{"category":"self","summary":"SUSE CVE CVE-2024-7254 page","url":"https://www.suse.com/security/cve/CVE-2024-7254/"}],"title":"Security update for protobuf","tracking":{"current_release_date":"2025-02-03T09:04:20Z","generator":{"date":"2025-02-03T09:04:20Z","engine":{"name":"cve-database.git:bin/generate-csaf.pl","version":"1"}},"id":"SUSE-SU-2025:20074-1","initial_release_date":"2025-02-03T09:04:20Z","revision_history":[{"date":"2025-02-03T09:04:20Z","number":"1","summary":"Current version"}],"status":"final","version":"1"}},"product_tree":{"branches":[{"branches":[{"branches":[{"category":"product_version","name":"libprotobuf-lite23_4_0-23.4-8.1.aarch64","product":{"name":"libprotobuf-lite23_4_0-23.4-8.1.aarch64","product_id":"libprotobuf-lite23_4_0-23.4-8.1.aarch64"}},{"category":"product_version","name":"libprotobuf23_4_0-23.4-8.1.aarch64","product":{"name":"libprotobuf23_4_0-23.4-8.1.aarch64","product_id":"libprotobuf23_4_0-23.4-8.1.aarch64"}}],"category":"architecture","name":"aarch64"},{"branches":[{"category":"product_version","name":"libprotobuf-lite23_4_0-23.4-8.1.s390x","product":{"name":"libprotobuf-lite23_4_0-23.4-8.1.s390x","product_id":"libprotobuf-lite23_4_0-23.4-8.1.s390x"}},{"category":"product_version","name":"libprotobuf23_4_0-23.4-8.1.s390x","product":{"name":"libprotobuf23_4_0-23.4-8.1.s390x","product_id":"libprotobuf23_4_0-23.4-8.1.s390x"}}],"category":"architecture","name":"s390x"},{"branches":[{"category":"product_version","name":"libprotobuf-lite23_4_0-23.4-8.1.x86_64","product":{"name":"libprotobuf-lite23_4_0-23.4-8.1.x86_64","product_id":"libprotobuf-lite23_4_0-23.4-8.1.x86_64"}},{"category":"product_version","name":"libprotobuf23_4_0-23.4-8.1.x86_64","product":{"name":"libprotobuf23_4_0-23.4-8.1.x86_64","product_id":"libprotobuf23_4_0-23.4-8.1.x86_64"}}],"category":"architecture","name":"x86_64"},{"branches":[{"category":"product_name","name":"SUSE Linux Micro 6.0","product":{"name":"SUSE Linux Micro 6.0","product_id":"SUSE Linux Micro 6.0","product_identification_helper":{"cpe":"cpe:/o:suse:sl-micro:6.0"}}}],"category":"product_family","name":"SUSE Linux Enterprise"}],"category":"vendor","name":"SUSE"}],"relationships":[{"category":"default_component_of","full_product_name":{"name":"libprotobuf-lite23_4_0-23.4-8.1.aarch64 as component of SUSE Linux Micro 6.0","product_id":"SUSE Linux Micro 6.0:libprotobuf-lite23_4_0-23.4-8.1.aarch64"},"product_reference":"libprotobuf-lite23_4_0-23.4-8.1.aarch64","relates_to_product_reference":"SUSE Linux Micro 6.0"},{"category":"default_component_of","full_product_name":{"name":"libprotobuf-lite23_4_0-23.4-8.1.s390x as component of SUSE Linux Micro 6.0","product_id":"SUSE Linux Micro 6.0:libprotobuf-lite23_4_0-23.4-8.1.s390x"},"product_reference":"libprotobuf-lite23_4_0-23.4-8.1.s390x","relates_to_product_reference":"SUSE Linux Micro 6.0"},{"category":"default_component_of","full_product_name":{"name":"libprotobuf-lite23_4_0-23.4-8.1.x86_64 as component of SUSE Linux Micro 6.0","product_id":"SUSE Linux Micro 6.0:libprotobuf-lite23_4_0-23.4-8.1.x86_64"},"product_reference":"libprotobuf-lite23_4_0-23.4-8.1.x86_64","relates_to_product_reference":"SUSE Linux Micro 6.0"},{"category":"default_component_of","full_product_name":{"name":"libprotobuf23_4_0-23.4-8.1.aarch64 as component of SUSE Linux Micro 6.0","product_id":"SUSE Linux Micro 6.0:libprotobuf23_4_0-23.4-8.1.aarch64"},"product_reference":"libprotobuf23_4_0-23.4-8.1.aarch64","relates_to_product_reference":"SUSE Linux Micro 6.0"},{"category":"default_component_of","full_product_name":{"name":"libprotobuf23_4_0-23.4-8.1.s390x as component of SUSE Linux Micro 6.0","product_id":"SUSE Linux Micro 6.0:libprotobuf23_4_0-23.4-8.1.s390x"},"product_reference":"libprotobuf23_4_0-23.4-8.1.s390x","relates_to_product_reference":"SUSE Linux Micro 6.0"},{"category":"default_component_of","full_product_name":{"name":"libprotobuf23_4_0-23.4-8.1.x86_64 as component of SUSE Linux Micro 6.0","product_id":"SUSE Linux Micro 6.0:libprotobuf23_4_0-23.4-8.1.x86_64"},"product_reference":"libprotobuf23_4_0-23.4-8.1.x86_64","relates_to_product_reference":"SUSE Linux Micro 6.0"}]},"vulnerabilities":[{"cve":"CVE-2024-7254","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2024-7254"}],"notes":[{"category":"general","text":"Any project that parses untrusted Protocol Buffers data  containing an arbitrary number of nested groups / series of SGROUP  tags can corrupted by exceeding the stack limit i.e. StackOverflow. Parsing nested groups as unknown fields with DiscardUnknownFieldsParser or Java Protobuf Lite parser, or against Protobuf map fields, creates unbounded recursions that can be abused by an attacker.","title":"CVE description"}],"product_status":{"recommended":["SUSE Linux Micro 6.0:libprotobuf-lite23_4_0-23.4-8.1.aarch64","SUSE Linux Micro 6.0:libprotobuf-lite23_4_0-23.4-8.1.s390x","SUSE Linux Micro 6.0:libprotobuf-lite23_4_0-23.4-8.1.x86_64","SUSE Linux Micro 6.0:libprotobuf23_4_0-23.4-8.1.aarch64","SUSE Linux Micro 6.0:libprotobuf23_4_0-23.4-8.1.s390x","SUSE Linux Micro 6.0:libprotobuf23_4_0-23.4-8.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2024-7254","url":"https://www.suse.com/security/cve/CVE-2024-7254"},{"category":"external","summary":"SUSE Bug 1230778 for CVE-2024-7254","url":"https://bugzilla.suse.com/1230778"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Linux Micro 6.0:libprotobuf-lite23_4_0-23.4-8.1.aarch64","SUSE Linux Micro 6.0:libprotobuf-lite23_4_0-23.4-8.1.s390x","SUSE Linux Micro 6.0:libprotobuf-lite23_4_0-23.4-8.1.x86_64","SUSE Linux Micro 6.0:libprotobuf23_4_0-23.4-8.1.aarch64","SUSE Linux Micro 6.0:libprotobuf23_4_0-23.4-8.1.s390x","SUSE Linux Micro 6.0:libprotobuf23_4_0-23.4-8.1.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":7.5,"baseSeverity":"HIGH","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","version":"3.1"},"products":["SUSE Linux Micro 6.0:libprotobuf-lite23_4_0-23.4-8.1.aarch64","SUSE Linux Micro 6.0:libprotobuf-lite23_4_0-23.4-8.1.s390x","SUSE Linux Micro 6.0:libprotobuf-lite23_4_0-23.4-8.1.x86_64","SUSE Linux Micro 6.0:libprotobuf23_4_0-23.4-8.1.aarch64","SUSE Linux Micro 6.0:libprotobuf23_4_0-23.4-8.1.s390x","SUSE Linux Micro 6.0:libprotobuf23_4_0-23.4-8.1.x86_64"]}],"threats":[{"category":"impact","date":"2025-02-03T09:04:20Z","details":"important"}],"title":"CVE-2024-7254"}]}