CVE Vulnerabilities

CVE-2024-7254

Uncontrolled Resource Consumption

Published: Sep 19, 2024 | Modified: Sep 26, 2025
CVSS 3.x
7.5
HIGH
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVSS 2.x
RedHat/V2
RedHat/V3
7.5 IMPORTANT
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

Any project that parses untrusted Protocol Buffers data containing an arbitrary number of nested groups / series of SGROUP tags can corrupted by exceeding the stack limit i.e. StackOverflow. Parsing nested groups as unknown fields with DiscardUnknownFieldsParser or Java Protobuf Lite parser, or against Protobuf map fields, creates unbounded recursions that can be abused by an attacker.

Weakness

The product does not properly control the allocation and maintenance of a limited resource.

Affected Software

NameVendorStart VersionEnd Version
ProtobufGoogle*3.25.5 (excluding)
ProtobufGoogle4.0.0 (including)4.27.5 (excluding)
ProtobufGoogle4.28.0 (including)4.28.2 (excluding)
Protobuf-javaGoogle*3.25.5 (excluding)
Protobuf-javaGoogle4.0.0 (including)4.27.5 (excluding)
Protobuf-javaGoogle4.28.0 (including)4.28.2 (excluding)
Protobuf-javaliteGoogle*3.25.5 (excluding)
Protobuf-javaliteGoogle4.0.0 (including)4.27.5 (excluding)
Protobuf-javaliteGoogle4.28.0 (including)4.28.2 (excluding)
Protobuf-kotlinGoogle*3.25.5 (excluding)
Protobuf-kotlinGoogle4.0.0 (including)4.27.5 (excluding)
Protobuf-kotlinGoogle4.28.0 (including)4.28.2 (excluding)
Protobuf-kotlin-liteGoogle*3.25.5 (excluding)
Protobuf-kotlin-liteGoogle4.0.0 (including)4.27.5 (excluding)
Protobuf-kotlin-liteGoogle4.28.0 (including)4.28.2 (including)
Red Hat build of Apache Camel 4.4.3 for Spring BootRedHat*
Red Hat build of Apache Camel 4.8 for Spring BootRedHat*
Red Hat build of Apache Camel 4 for Quarkus 3RedHatcom.google.protobuf/protobuf-java*
Red Hat build of Quarkus 3.2RedHatcom.google.protobuf/protobuf*
Red Hat build of Quarkus 3.8RedHatcom.google.protobuf/protobuf*
Red Hat JBoss EAP XP 5.0 Update 2.0RedHatprotobuf-java*
Red Hat JBoss Enterprise Application Platform 7RedHat*
Red Hat JBoss Enterprise Application Platform 7.4 ELS on RHEL 7RedHateap7-protostream-0:4.3.7-1.Final_redhat_00001.1.el7eap*
Red Hat JBoss Enterprise Application Platform 7.4 ELS on RHEL 7RedHateap7-wildfly-0:7.4.23-5.GA_redhat_00004.1.el7eap*
Red Hat JBoss Enterprise Application Platform 7.4 ELS on RHEL 8RedHateap7-protostream-0:4.3.7-1.Final_redhat_00001.1.el8eap*
Red Hat JBoss Enterprise Application Platform 7.4 ELS on RHEL 8RedHateap7-wildfly-0:7.4.23-5.GA_redhat_00004.1.el8eap*
Red Hat JBoss Enterprise Application Platform 7.4 ELS on RHEL 9RedHateap7-protostream-0:4.3.7-1.Final_redhat_00001.1.el9eap*
Red Hat JBoss Enterprise Application Platform 7.4 ELS on RHEL 9RedHateap7-wildfly-0:7.4.23-5.GA_redhat_00004.1.el9eap*
Streams for Apache Kafka 2.8.0RedHat*
Red Hat Trusted Profile Analyzer 1.2RedHatrhtpa/rhtpa-trustification-service-rhel9:sha256:8c6e51e26ca9a1d4d4fc9e90650103e60360cf0571533c56fbd08dac3007efbe*
Red Hat Trusted Profile Analyzer 1.2RedHatrhtpa/rhtpa-guac-rhel9:sha256:9cc0e1374aa5e6ff8caf86d9bbd6f9c2dfa14d812ad99ae653a2fbb8ec124f30*
ProtobufUbuntuesm-infra-legacy/trusty*
ProtobufUbuntuesm-infra/bionic*
ProtobufUbuntuesm-infra/focal*
ProtobufUbuntuesm-infra/xenial*
ProtobufUbuntufocal*
ProtobufUbuntujammy*
ProtobufUbuntunoble*
ProtobufUbuntuoracular*
ProtobufUbuntuplucky*
ProtobufUbuntutrusty/esm*
ProtobufUbuntuupstream*

Potential Mitigations

  • Mitigation of resource exhaustion attacks requires that the target system either:

  • The first of these solutions is an issue in itself though, since it may allow attackers to prevent the use of the system by a particular valid user. If the attacker impersonates the valid user, they may be able to prevent the user from accessing the server in question.

  • The second solution is simply difficult to effectively institute – and even when properly done, it does not provide a full solution. It simply makes the attack require more resources on the part of the attacker.

References