10 Star 1 Fork 50

src-openEuler/protobuf

CVE-2024-7254

已挂起
CVE和安全问题 拥有者
创建于  
2024-09-19 09:27

一、漏洞信息
漏洞编号:CVE-2024-7254
漏洞归属组件:protobuf
漏洞归属的版本:25.1,3.12.3,3.13.0,3.14.0,3.15.6,3.19.6,>= 3.13.0,>= 3.13.0
CVSS V3.0分值:
BaseScore:N/A None
Vector:CVSS:3.0/
漏洞简述:
Any project that parses untrusted Protocol Buffers data containing an arbitrary number of nested groups / series of SGROUP tags can corrupted by exceeding the stack limit i.e. StackOverflow. Parsing nested groups as unknown fields with DiscardUnknownFieldsParser or Java Protobuf Lite parser, or against Protobuf map fields, creates unbounded recursions that can be abused by an attacker.
漏洞公开时间:2024-09-19 09:15:10
漏洞创建时间:2024-09-19 09:27:16
漏洞详情参考链接:
https://nvd.nist.gov/vuln/detail/CVE-2024-7254

更多参考(点击展开)
参考来源 参考链接 来源链接
cve-coordination.google.com https://github.com/protocolbuffers/protobuf/commit/cc8b3483a5584b3301e3d43d17eb59704857ffaa
af854a3a-2127-422b-91ae-364da2661108 https://security.netapp.com/advisory/ntap-20241213-0010/
suse_bugzilla http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-7254 https://bugzilla.suse.com/show_bug.cgi?id=1230778
suse_bugzilla https://www.cve.org/CVERecord?id=CVE-2024-7254 https://bugzilla.suse.com/show_bug.cgi?id=1230778
suse_bugzilla https://github.com/protocolbuffers/protobuf/commit/cc8b3483a5584b3301e3d43d17eb59704857ffaa https://bugzilla.suse.com/show_bug.cgi?id=1230778
suse_bugzilla https://bugzilla.redhat.com/show_bug.cgi?id=2313454 https://bugzilla.suse.com/show_bug.cgi?id=1230778
redhat_bugzilla https://access.redhat.com/errata/RHSA-2024:7972 https://bugzilla.redhat.com/show_bug.cgi?id=2313454
redhat_bugzilla https://access.redhat.com/errata/RHSA-2024:9571 https://bugzilla.redhat.com/show_bug.cgi?id=2313454
debian https://security-tracker.debian.org/tracker/CVE-2024-7254
oracle https://www.oracle.com/security-alerts/cpuoct2024.html
ruby https://github.com/rubysec/ruby-advisory-db/gems/google-protobuf/CVE-2024-7254.yml
amazon_linux_explore https://access.redhat.com/security/cve/CVE-2024-7254 https://explore.alas.aws.amazon.com/CVE-2024-7254.html
amazon_linux_explore https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7254 https://explore.alas.aws.amazon.com/CVE-2024-7254.html

漏洞分析指导链接:
https://gitee.com/openeuler/cve-manager/blob/master/cve-vulner-manager/doc/md/manual.md
漏洞数据来源:
其它
漏洞补丁信息:

详情(点击展开)
影响的包 修复版本 修复补丁 问题引入补丁 来源
https://github.com/protocolbuffers/protobuf/commit/cc8b3483a5584b3301e3d43d17eb59704857ffaa cve-coordination.google.com
https://github.com/protocolbuffers/protobuf/commit/cc8b3483a5584b3301e3d43d17eb59704857ffaa suse_bugzilla

二、漏洞分析结构反馈
影响性分析说明:
任何解析包含任意数量的嵌套组/系列 SGROUP 标签的不受信任的 Protocol Buffers 数据的项目都可能因超出堆栈限制(即 StackOverflow)而损坏。使用 DiscardUnknownFieldsParser 或 Java Protobuf Lite 解析器或针对 Protobuf 映射字段将嵌套组解析为未知字段,会创建可能被攻击者滥用的无界递归。
openEuler评分:
7.5
Vector:CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
受影响版本排查(受影响/不受影响):
1.master(25.1):受影响
2.openEuler-20.03-LTS-SP4(3.14.0):受影响
3.openEuler-22.03-LTS-SP1(3.14.0):受影响
4.openEuler-22.03-LTS-SP3(3.14.0):受影响
5.openEuler-22.03-LTS-SP4(3.14.0):受影响
6.openEuler-24.03-LTS(25.1):受影响
7.openEuler-24.03-LTS-Next(25.1):受影响
8.openEuler-24.03-LTS-SP2(25.1):

修复是否涉及abi变化(是/否):
1.master(25.1):否
2.openEuler-20.03-LTS-SP4(3.14.0):否
3.openEuler-22.03-LTS-SP1(3.14.0):否
4.openEuler-22.03-LTS-SP3(3.14.0):否
5.openEuler-22.03-LTS-SP4(3.14.0):否
6.openEuler-24.03-LTS(25.1):否
7.openEuler-24.03-LTS-Next(25.1):否
8.openEuler-24.03-LTS-SP2(25.1):

原因说明:
1.master(25.1):
2.openEuler-20.03-LTS-SP4(3.14.0):
3.openEuler-22.03-LTS-SP3(3.14.0):
4.openEuler-22.03-LTS-SP4(3.14.0):
5.openEuler-24.03-LTS(25.1):
6.openEuler-24.03-LTS-Next(25.1):
7.openEuler-24.03-LTS-SP1(25.1):
8.openEuler-24.03-LTS-SP2(25.1):

评论 (20)

登录 后才可以发表评论

状态
负责人
项目
里程碑
分支
预计工期 (小时)
开始日期   -   截止日期
-
置顶选项
优先级
关联仓库
关联里程碑
关联分支
参与者(1)
5329419 openeuler ci bot 1632792936
1
https://gitee.com/src-openeuler/protobuf.git
git@gitee.com:src-openeuler/protobuf.git
src-openeuler
protobuf
protobuf

搜索帮助