First published: Mon Apr 14 2025(Updated: )
It was discovered that Protocol Buffers incorrectly handled memory when receiving malicious input using the Java bindings. An attacker could possibly use this issue to cause a denial of service.
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/libprotobuf-java | <3.21.12-9ubuntu1.1 | 3.21.12-9ubuntu1.1 |
Ubuntu | =24.10 | |
All of | ||
ubuntu/libprotobuf-java | <3.21.12-8.2ubuntu0.1 | 3.21.12-8.2ubuntu0.1 |
Ubuntu | =24.04 | |
All of | ||
ubuntu/libprotobuf-java | <3.12.4-1ubuntu7.22.04.2 | 3.12.4-1ubuntu7.22.04.2 |
Ubuntu | =22.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of USN-7435-1 is rated as high due to the potential for denial of service.
To fix USN-7435-1, you should upgrade the libprotobuf-java package to version 3.21.12-9ubuntu1.1 or later, depending on your Ubuntu version.
The affected versions of Ubuntu include 24.10, 24.04, and 22.04 with specific libprotobuf-java package versions.
The vulnerability in USN-7435-1 involves incorrect memory handling in Protocol Buffers when processing malicious input using Java bindings.
While USN-7435-1 primarily leads to denial of service, it does not directly indicate potential data compromise.