<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for protobuf</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE-SU-2025:20672-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2025-09-05T12:17:44Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2025-09-05T12:17:44Z</InitialReleaseDate>
    <CurrentReleaseDate>2025-09-05T12:17:44Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for protobuf</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for protobuf fixes the following issues:

- CVE-2024-2410: Use after free when parsing JSON from a stream (bsc#1223947).
- CVE-2024-7254: StackOverflow vulnerability in Protocol Buffers (bsc#1230778).
- CVE-2025-4565: Parsing of untrusted Protocol Buffers data containing an arbitrary number of recursive groups or messages can lead to crash due to RecursionError (bsc#1244663).
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">SUSE-SLE-Micro-6.1-250</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202520672-1/</URL>
      <Description>Link for SUSE-SU-2025:20672-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.suse.com/pipermail/sle-updates/2025-September/041629.html</URL>
      <Description>E-Mail link for SUSE-SU-2025:20672-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1223947</URL>
      <Description>SUSE Bug 1223947</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1230778</URL>
      <Description>SUSE Bug 1230778</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1244663</URL>
      <Description>SUSE Bug 1244663</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-2410/</URL>
      <Description>SUSE CVE CVE-2024-2410 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-7254/</URL>
      <Description>SUSE CVE CVE-2024-7254 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-4565/</URL>
      <Description>SUSE CVE CVE-2025-4565 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="SUSE Linux Micro 6.1">
      <Branch Type="Product Name" Name="SUSE Linux Micro 6.1">
        <FullProductName ProductID="SUSE Linux Micro 6.1" CPE="cpe:/o:suse:sl-micro:6.1">SUSE Linux Micro 6.1</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="libprotobuf23_4_0-23.4-slfo.1.1_2.1">
      <FullProductName ProductID="libprotobuf23_4_0-23.4-slfo.1.1_2.1">libprotobuf23_4_0-23.4-slfo.1.1_2.1</FullProductName>
    </Branch>
    <Relationship ProductReference="libprotobuf23_4_0-23.4-slfo.1.1_2.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Micro 6.1">
      <FullProductName ProductID="SUSE Linux Micro 6.1:libprotobuf23_4_0-23.4-slfo.1.1_2.1">libprotobuf23_4_0-23.4-slfo.1.1_2.1 as a component of SUSE Linux Micro 6.1</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The JsonToBinaryStream()  function is part of the protocol buffers C++ implementation and is used to parse JSON from a stream. If the input is broken up into separate chunks in a certain way, the parser will attempt to read bytes from a chunk that has already been freed.  
</Note>
    </Notes>
    <CVE>CVE-2024-2410</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Micro 6.1:libprotobuf23_4_0-23.4-slfo.1.1_2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202520672-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-2410.html</URL>
        <Description>CVE-2024-2410</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1223947</URL>
        <Description>SUSE Bug 1223947</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Any project that parses untrusted Protocol Buffers data  containing an arbitrary number of nested groups / series of SGROUP  tags can corrupted by exceeding the stack limit i.e. StackOverflow. Parsing nested groups as unknown fields with DiscardUnknownFieldsParser or Java Protobuf Lite parser, or against Protobuf map fields, creates unbounded recursions that can be abused by an attacker.</Note>
    </Notes>
    <CVE>CVE-2024-7254</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Micro 6.1:libprotobuf23_4_0-23.4-slfo.1.1_2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202520672-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-7254.html</URL>
        <Description>CVE-2024-7254</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1230778</URL>
        <Description>SUSE Bug 1230778</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Any project that uses Protobuf Pure-Python backend  to parse untrusted Protocol Buffers data containing an arbitrary number of recursive groups, recursive messages or a series of SGROUP  tags can be corrupted by exceeding the Python recursion limit. This can result in a Denial of service by crashing the application with a RecursionError. We recommend upgrading to version =&gt;6.31.1 or beyond commit  17838beda2943d08b8a9d4df5b68f5f04f26d901</Note>
    </Notes>
    <CVE>CVE-2025-4565</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Micro 6.1:libprotobuf23_4_0-23.4-slfo.1.1_2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202520672-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-4565.html</URL>
        <Description>CVE-2025-4565</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1244663</URL>
        <Description>SUSE Bug 1244663</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
