USN-8063-1

Source
https://ubuntu.com/security/notices/USN-8063-1
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-8063-1.json
JSON Data
https://api.osv.dev/v1/vulns/USN-8063-1
Upstream
Related
Published
2026-02-25T12:38:01Z
Modified
2026-02-28T06:45:39.714702Z
Summary
protobuf vulnerability
Details

It was discovered that Protocol Buffers incorrectly handled recursion when the Python google.protobuf.json_format.ParseDict() function is being used. An attacker could possibly use this issue to cause Protocol Buffers to consume resources, resulting in a denial of service.

References

Affected packages

Ubuntu:22.04:LTS / protobuf

Package

Name
protobuf
Purl
pkg:deb/ubuntu/protobuf@3.12.4-1ubuntu7.22.04.6?arch=source&distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.12.4-1ubuntu7.22.04.6

Affected versions

3.*
3.12.4-1ubuntu3
3.12.4-1ubuntu5
3.12.4-1ubuntu6
3.12.4-1ubuntu7
3.12.4-1ubuntu7.22.04.1
3.12.4-1ubuntu7.22.04.2
3.12.4-1ubuntu7.22.04.4

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "3.12.4-1ubuntu7.22.04.6",
            "binary_name": "elpa-protobuf-mode"
        },
        {
            "binary_version": "3.12.4-1ubuntu7.22.04.6",
            "binary_name": "libprotobuf-dev"
        },
        {
            "binary_version": "3.12.4-1ubuntu7.22.04.6",
            "binary_name": "libprotobuf-java"
        },
        {
            "binary_version": "3.12.4-1ubuntu7.22.04.6",
            "binary_name": "libprotobuf-lite23"
        },
        {
            "binary_version": "3.12.4-1ubuntu7.22.04.6",
            "binary_name": "libprotobuf23"
        },
        {
            "binary_version": "3.12.4-1ubuntu7.22.04.6",
            "binary_name": "libprotoc-dev"
        },
        {
            "binary_version": "3.12.4-1ubuntu7.22.04.6",
            "binary_name": "libprotoc23"
        },
        {
            "binary_version": "3.12.4-1ubuntu7.22.04.6",
            "binary_name": "protobuf-compiler"
        },
        {
            "binary_version": "3.12.4-1ubuntu7.22.04.6",
            "binary_name": "python3-protobuf"
        },
        {
            "binary_version": "3.12.4-1ubuntu7.22.04.6",
            "binary_name": "ruby-google-protobuf"
        }
    ],
    "availability": "No subscription required"
}

Database specific

cves_map
{
    "ecosystem": "Ubuntu:22.04:LTS",
    "cves": [
        {
            "severity": [
                {
                    "score": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L",
                    "type": "CVSS_V4"
                },
                {
                    "score": "medium",
                    "type": "Ubuntu"
                }
            ],
            "id": "CVE-2026-0994"
        }
    ]
}
source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-8063-1.json"

Ubuntu:24.04:LTS / protobuf

Package

Name
protobuf
Purl
pkg:deb/ubuntu/protobuf@3.21.12-8.2ubuntu0.3?arch=source&distro=noble

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.21.12-8.2ubuntu0.3

Affected versions

3.*
3.21.12-7ubuntu1
3.21.12-8ubuntu1
3.21.12-8ubuntu5
3.21.12-8.2
3.21.12-8.2build1
3.21.12-8.2ubuntu0.1
3.21.12-8.2ubuntu0.2

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "3.21.12-8.2ubuntu0.3",
            "binary_name": "elpa-protobuf-mode"
        },
        {
            "binary_version": "3.21.12-8.2ubuntu0.3",
            "binary_name": "libprotobuf-dev"
        },
        {
            "binary_version": "3.21.12-8.2ubuntu0.3",
            "binary_name": "libprotobuf-java"
        },
        {
            "binary_version": "3.21.12-8.2ubuntu0.3",
            "binary_name": "libprotobuf-lite32t64"
        },
        {
            "binary_version": "3.21.12-8.2ubuntu0.3",
            "binary_name": "libprotobuf32t64"
        },
        {
            "binary_version": "3.21.12-8.2ubuntu0.3",
            "binary_name": "libprotoc-dev"
        },
        {
            "binary_version": "3.21.12-8.2ubuntu0.3",
            "binary_name": "libprotoc32t64"
        },
        {
            "binary_version": "3.21.12-8.2ubuntu0.3",
            "binary_name": "php-google-protobuf"
        },
        {
            "binary_version": "3.21.12-8.2ubuntu0.3",
            "binary_name": "protobuf-compiler"
        },
        {
            "binary_version": "3.21.12-8.2ubuntu0.3",
            "binary_name": "python3-protobuf"
        },
        {
            "binary_version": "3.21.12-8.2ubuntu0.3",
            "binary_name": "ruby-google-protobuf"
        }
    ],
    "availability": "No subscription required"
}

Database specific

cves_map
{
    "ecosystem": "Ubuntu:24.04:LTS",
    "cves": [
        {
            "severity": [
                {
                    "score": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L",
                    "type": "CVSS_V4"
                },
                {
                    "score": "medium",
                    "type": "Ubuntu"
                }
            ],
            "id": "CVE-2026-0994"
        }
    ]
}
source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-8063-1.json"

Ubuntu:25.10 / protobuf

Package

Name
protobuf
Purl
pkg:deb/ubuntu/protobuf@3.21.12-11ubuntu3.1?arch=source&distro=questing

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.21.12-11ubuntu3.1

Affected versions

3.*
3.21.12-10build2
3.21.12-11
3.21.12-11ubuntu1
3.21.12-11ubuntu3

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "3.21.12-11ubuntu3.1",
            "binary_name": "elpa-protobuf-mode"
        },
        {
            "binary_version": "3.21.12-11ubuntu3.1",
            "binary_name": "libprotobuf-dev"
        },
        {
            "binary_version": "3.21.12-11ubuntu3.1",
            "binary_name": "libprotobuf-java"
        },
        {
            "binary_version": "3.21.12-11ubuntu3.1",
            "binary_name": "libprotobuf-lite32t64"
        },
        {
            "binary_version": "3.21.12-11ubuntu3.1",
            "binary_name": "libprotobuf32t64"
        },
        {
            "binary_version": "3.21.12-11ubuntu3.1",
            "binary_name": "libprotoc-dev"
        },
        {
            "binary_version": "3.21.12-11ubuntu3.1",
            "binary_name": "libprotoc32t64"
        },
        {
            "binary_version": "3.21.12-11ubuntu3.1",
            "binary_name": "php-google-protobuf"
        },
        {
            "binary_version": "3.21.12-11ubuntu3.1",
            "binary_name": "protobuf-compiler"
        },
        {
            "binary_version": "3.21.12-11ubuntu3.1",
            "binary_name": "python3-protobuf"
        },
        {
            "binary_version": "3.21.12-11ubuntu3.1",
            "binary_name": "ruby-google-protobuf"
        }
    ],
    "availability": "No subscription required"
}

Database specific

cves_map
{
    "ecosystem": "Ubuntu:25.10",
    "cves": [
        {
            "severity": [
                {
                    "score": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L",
                    "type": "CVSS_V4"
                },
                {
                    "score": "medium",
                    "type": "Ubuntu"
                }
            ],
            "id": "CVE-2026-0994"
        }
    ]
}
source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-8063-1.json"