Release date:
2025-09-04 20:25:15 UTC
Description:
- CVE-2024-7254: prevent stack overflow by limiting recursion depth when parsing
nested Protocol Buffers data
Updated packages:
-
protobuf-3.14.0-13.el9.tuxcare.els1.i686.rpm
sha:c2801c81d809af63dbb3f6ada0cb8c6dc29678d030d2ab03f20799d3f6e29302
-
protobuf-3.14.0-13.el9.tuxcare.els1.x86_64.rpm
sha:0f916dd5aaa9077d75e039e9668182472a85c08838c89f7bfd2e30d7f98224bc
-
protobuf-compiler-3.14.0-13.el9.tuxcare.els1.i686.rpm
sha:dd41103b0878532716a735e72c58ebd2e02dbf85fe4088c132f3ef9e9d887303
-
protobuf-compiler-3.14.0-13.el9.tuxcare.els1.x86_64.rpm
sha:0ec32d3299132135d312edcd10dad3eae04c1af388e158ffc2267824281c4aa9
-
protobuf-devel-3.14.0-13.el9.tuxcare.els1.i686.rpm
sha:c408631477c25b61d6be6b0b5bd543643fd8677278277bf905be32bb4e1a75e5
-
protobuf-devel-3.14.0-13.el9.tuxcare.els1.x86_64.rpm
sha:7f5eabeaa0418910585a1ce6909bdef29707829162b3b2e570456a521508eb5a
-
protobuf-emacs-3.14.0-13.el9.tuxcare.els1.noarch.rpm
sha:33dbf9d0a6682bf0a00ee0cea26688950665094c15bc1b1e353ec01806dd17b0
-
protobuf-lite-3.14.0-13.el9.tuxcare.els1.i686.rpm
sha:ee9113824a8e60fe7f540495cb89aae20c31a5041c048564b9d638931acc50fd
-
protobuf-lite-3.14.0-13.el9.tuxcare.els1.x86_64.rpm
sha:fc226f91c33ffe9ed6f30235e5bb9399edb3edd712dff9508cda345b68894717
-
protobuf-lite-devel-3.14.0-13.el9.tuxcare.els1.i686.rpm
sha:95f576b3650a0d9cd3987d904c7aa0b4ee3761d28fd813eecd3e3080d47c9455
-
protobuf-lite-devel-3.14.0-13.el9.tuxcare.els1.x86_64.rpm
sha:82afb748399055601ba02f200c12376929fe85e443a90a2a2f6fb4811b350115
-
protobuf-lite-static-3.14.0-13.el9.tuxcare.els1.x86_64.rpm
sha:579197c1bf52b84fab6edc56d6df203b531379e7ff7131062c43cdc070408782
-
protobuf-static-3.14.0-13.el9.tuxcare.els1.x86_64.rpm
sha:6f7b8b941cf6ecffc5d13489212b4efa5063fdc7a30685f32abc56c65f794ebf
-
protobuf-vim-3.14.0-13.el9.tuxcare.els1.noarch.rpm
sha:3607cc9ceae2a43a6ff380fd9f606726bb655126a32d00967abf630e050feda6
-
python3-protobuf-3.14.0-13.el9.tuxcare.els1.noarch.rpm
sha:70c6aba4f8e3331fbe4adde98b4516671bb2d8faaa868acde8209df5ea121b39
Notes:
This page is generated automatically and has not been checked for errors. For clarification or
corrections please contact the
CloudLinux Packaging Team.