Google Protobuf Kotlin
Don't miss out!
Thousands of developers use stack.watch to stay informed.Get an email whenever new security vulnerabilities are reported in Google Protobuf Kotlin.
By the Year
In 2026 there have been 0 vulnerabilities in Google Protobuf Kotlin. Protobuf Kotlin did not have any published security vulnerabilities last year.
| Year | Vulnerabilities | Average Score |
|---|---|---|
| 2026 | 0 | 0.00 |
| 2025 | 0 | 0.00 |
| 2024 | 1 | 7.50 |
| 2023 | 0 | 0.00 |
| 2022 | 2 | 6.50 |
It may take a day or so for new Protobuf Kotlin vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.
Recent Google Protobuf Kotlin Security Vulnerabilities
Java Protobuf: StackOverflow via Untrusted Nested SGROUP Tags
CVE-2024-7254
7.5 - High
- September 19, 2024
Any project that parses untrusted Protocol Buffers data containing an arbitrary number of nested groups / series of SGROUP tags can corrupted by exceeding the stack limit i.e. StackOverflow. Parsing nested groups as unknown fields with DiscardUnknownFieldsParser or Java Protobuf Lite parser, or against Protobuf map fields, creates unbounded recursions that can be abused by an attacker.
Memory Corruption
DoS via Binary Parsing in protobuf-java core/lite < 3.21.7, 3.20.3, 3.19.6
CVE-2022-3171
7.5 - High
- October 12, 2022
A parsing issue with binary data in protobuf-java core and lite versions prior to 3.21.7, 3.20.3, 3.19.6 and 3.16.3 can lead to a denial of service attack. Inputs containing multiple instances of non-repeated embedded messages with repeated or unknown fields causes objects to be converted back-n-forth between mutable and immutable forms, resulting in potentially long garbage collection pauses. We recommend updating to the versions mentioned above.
An issue in protobuf-java allowed the interleaving of com.google.protobuf.UnknownFieldSet fields in such a way
CVE-2021-22569
5.5 - Medium
- January 10, 2022
An issue in protobuf-java allowed the interleaving of com.google.protobuf.UnknownFieldSet fields in such a way that would be processed out of order. A small malicious payload can occupy the parser for several minutes by creating large numbers of short-lived objects that cause frequent, repeated pauses. We recommend upgrading libraries beyond the vulnerable versions.
Stay on top of Security Vulnerabilities
Want an email whenever new vulnerabilities are published for Google Protobuf Kotlin or by Google? Click the Watch button to subscribe.