{
  "version": "1",
  "package": [
    {
      "name": "protobuf",
      "layer": "meta-oe",
      "version": "4.25.3",
      "products": [
        {
          "product": "protobuf",
          "cvesInRecord": "Yes"
        }
      ],
      "issue": [
        {
          "id": "CVE-2015-5237",
          "summary": "protobuf allows remote authenticated attackers to cause a heap-based buffer overflow.",
          "scorev2": "6.5",
          "scorev3": "8.8",
          "vector": "NETWORK",
          "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
          "status": "Patched",
          "link": "https://nvd.nist.gov/vuln/detail/CVE-2015-5237"
        },
        {
          "id": "CVE-2021-22570",
          "summary": "Nullptr dereference when a null char is present in a proto symbol. The symbol is parsed incorrectly, leading to an unchecked call into the proto file's name during generation of the resulting error message. Since the symbol is incorrectly parsed, the file is nullptr. We recommend upgrading to version 3.15.0 or greater.",
          "scorev2": "2.1",
          "scorev3": "5.5",
          "vector": "LOCAL",
          "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
          "status": "Patched",
          "link": "https://nvd.nist.gov/vuln/detail/CVE-2021-22570"
        },
        {
          "id": "CVE-2021-3121",
          "summary": "An issue was discovered in GoGo Protobuf before 1.3.2. plugin/unmarshal/unmarshal.go lacks certain index validation, aka the \"skippy peanut butter\" issue.",
          "scorev2": "7.5",
          "scorev3": "8.6",
          "vector": "NETWORK",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "status": "Patched",
          "link": "https://nvd.nist.gov/vuln/detail/CVE-2021-3121"
        },
        {
          "id": "CVE-2023-24535",
          "summary": "Parsing invalid messages can panic. Parsing a text-format message which contains a potential number consisting of a minus sign, one or more characters of whitespace, and no further input will cause a panic.",
          "scorev2": "0.0",
          "scorev3": "7.5",
          "vector": "NETWORK",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "status": "Patched",
          "link": "https://nvd.nist.gov/vuln/detail/CVE-2023-24535"
        }
      ]
    }
  ]
}