Debian Package Tracker
Register | Log in
Subscribe

protobuf

Choose email to subscribe with

general
  • source: protobuf (main)
  • version: 3.12.4-1
  • maintainer: Laszlo Boszormenyi (GCS) (DMD)
  • arch: all any
  • std-ver: 4.5.1
  • VCS: unknown
versions [more versions can be listed by madison] [old versions available from snapshot.debian.org]
[pool directory]
  • o-o-stable: 3.0.0-9
  • o-o-bpo: 3.6.1-4~bpo9+1
  • oldstable: 3.6.1.3-2
  • old-bpo: 3.12.3-2~bpo10+1
  • stable: 3.12.4-1
  • testing: 3.12.4-1
  • unstable: 3.12.4-1
  • exp: 3.20.1-1
versioned links
  • 3.0.0-9: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 3.6.1-4~bpo9+1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 3.6.1.3-2: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 3.12.3-2~bpo10+1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 3.12.4-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 3.20.1-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
binaries
  • elpa-protobuf-mode
  • libprotobuf-dev
  • libprotobuf-java
  • libprotobuf-lite23
  • libprotobuf23
  • libprotoc-dev
  • libprotoc23
  • protobuf-compiler (1 bugs: 0, 0, 1, 0)
  • python3-protobuf
  • ruby-google-protobuf (1 bugs: 0, 0, 1, 0)
action needed
A new upstream version is available: 3.20.1 high
A new upstream version 3.20.1 is available, you should consider packaging it.
Created: 2020-07-16 Last update: 2022-08-11 23:34
2 security issues in sid high

There are 2 open security issues in sid.

2 important issues:
  • CVE-2021-22569: An issue in protobuf-java allowed the interleaving of com.google.protobuf.UnknownFieldSet fields in such a way that would be processed out of order. A small malicious payload can occupy the parser for several minutes by creating large numbers of short-lived objects that cause frequent, repeated pauses. We recommend upgrading libraries beyond the vulnerable versions.
  • CVE-2021-22570: Nullptr dereference when a null char is present in a proto symbol. The symbol is parsed incorrectly, leading to an unchecked call into the proto file's name during generation of the resulting error message. Since the symbol is incorrectly parsed, the file is nullptr. We recommend upgrading to version 3.15.0 or greater.
Created: 2022-07-04 Last update: 2022-08-01 13:40
2 security issues in bookworm high

There are 2 open security issues in bookworm.

2 important issues:
  • CVE-2021-22569: An issue in protobuf-java allowed the interleaving of com.google.protobuf.UnknownFieldSet fields in such a way that would be processed out of order. A small malicious payload can occupy the parser for several minutes by creating large numbers of short-lived objects that cause frequent, repeated pauses. We recommend upgrading libraries beyond the vulnerable versions.
  • CVE-2021-22570: Nullptr dereference when a null char is present in a proto symbol. The symbol is parsed incorrectly, leading to an unchecked call into the proto file's name during generation of the resulting error message. Since the symbol is incorrectly parsed, the file is nullptr. We recommend upgrading to version 3.15.0 or greater.
Created: 2022-07-04 Last update: 2022-08-01 13:40
lintian reports 4 errors and 16 warnings high
Lintian reports 4 errors and 16 warnings about this package. You should make the package lintian clean getting rid of them.
Created: 2020-09-21 Last update: 2022-07-30 12:16
1 bug tagged patch in the BTS normal
The BTS contains patches fixing 1 bug, consider including or untagging them.
Created: 2022-07-27 Last update: 2022-08-12 03:02
2 low-priority security issues in bullseye low

There are 2 open security issues in bullseye.

2 issues left for the package maintainer to handle:
  • CVE-2021-22569: (needs triaging) An issue in protobuf-java allowed the interleaving of com.google.protobuf.UnknownFieldSet fields in such a way that would be processed out of order. A small malicious payload can occupy the parser for several minutes by creating large numbers of short-lived objects that cause frequent, repeated pauses. We recommend upgrading libraries beyond the vulnerable versions.
  • CVE-2021-22570: (needs triaging) Nullptr dereference when a null char is present in a proto symbol. The symbol is parsed incorrectly, leading to an unchecked call into the proto file's name during generation of the resulting error message. Since the symbol is incorrectly parsed, the file is nullptr. We recommend upgrading to version 3.15.0 or greater.

You can find information about how to handle these issues in the security team's documentation.

Created: 2022-07-04 Last update: 2022-08-01 13:40
Build log checks report 2 warnings low
Build log checks report 2 warnings
Created: 2022-07-24 Last update: 2022-07-24 12:06
Standards version of the package is outdated. wishlist
The package should be updated to follow the last version of Debian Policy (Standards-Version 4.6.1 instead of 4.5.1).
Created: 2021-08-18 Last update: 2022-05-11 23:24
testing migrations
  • This package will soon be part of the ruby3.1-add transition. You might want to ensure that your package is ready for it. You can probably find supplementary information in the debian-release archives or in the corresponding release.debian.org bug.
  • This package will soon be part of the auto-protobuf transition. You might want to ensure that your package is ready for it. You can probably find supplementary information in the debian-release archives or in the corresponding release.debian.org bug.
news
[rss feed]
  • [2022-04-24] Accepted protobuf 3.20.1-1 (source) into experimental (Laszlo Boszormenyi (GCS)) (signed by: Laszlo Boszormenyi)
  • [2022-04-09] Accepted protobuf 3.20.1~rc1-1 (source) into experimental (Laszlo Boszormenyi (GCS)) (signed by: Laszlo Boszormenyi)
  • [2022-03-26] Accepted protobuf 3.20.0-1 (source) into experimental (Laszlo Boszormenyi (GCS)) (signed by: Laszlo Boszormenyi)
  • [2022-03-19] Accepted protobuf 3.20.0~rc2-1 (source) into experimental (Laszlo Boszormenyi (GCS)) (signed by: Laszlo Boszormenyi)
  • [2022-03-12] Accepted protobuf 3.20.0~rc1-1 (source all amd64) into experimental, experimental (Debian FTP Masters) (signed by: Laszlo Boszormenyi)
  • [2022-01-30] Accepted protobuf 3.19.4-1 (source) into experimental (Laszlo Boszormenyi (GCS)) (signed by: Laszlo Boszormenyi)
  • [2022-01-16] Accepted protobuf 3.19.3-1 (source) into experimental (Laszlo Boszormenyi (GCS)) (signed by: Laszlo Boszormenyi)
  • [2021-11-05] Accepted protobuf 3.19.1-1 (source) into experimental (Laszlo Boszormenyi (GCS)) (signed by: Laszlo Boszormenyi)
  • [2021-10-26] Accepted protobuf 3.19.0-1 (source all amd64) into experimental, experimental (Debian FTP Masters) (signed by: Laszlo Boszormenyi)
  • [2021-10-10] Accepted protobuf 3.18.1-1 (source) into experimental (Laszlo Boszormenyi (GCS)) (signed by: Laszlo Boszormenyi)
  • [2021-09-23] Accepted protobuf 3.18.0-1 (source) into experimental (Laszlo Boszormenyi (GCS)) (signed by: Laszlo Boszormenyi)
  • [2021-09-03] Accepted protobuf 3.18.0~rc2-1 (source all amd64) into experimental, experimental (Debian FTP Masters) (signed by: Laszlo Boszormenyi)
  • [2021-09-03] Accepted protobuf 3.18.0~rc1-1 (source all amd64) into experimental, experimental (Debian FTP Masters) (signed by: Laszlo Boszormenyi)
  • [2021-08-10] Accepted protobuf 3.17.3-2 (source) into experimental (Laszlo Boszormenyi (GCS)) (signed by: Laszlo Boszormenyi)
  • [2021-06-23] Accepted protobuf 3.17.3-1 (source) into experimental (Laszlo Boszormenyi (GCS)) (signed by: Laszlo Boszormenyi)
  • [2021-06-11] Accepted protobuf 3.17.2-1 (source all amd64) into experimental, experimental (Debian FTP Masters) (signed by: Laszlo Boszormenyi)
  • [2021-06-11] Accepted protobuf 3.17.1-1 (source all amd64) into experimental, experimental (Debian FTP Masters) (signed by: Laszlo Boszormenyi)
  • [2021-01-24] protobuf 3.12.4-1 MIGRATED to testing (Debian testing watch)
  • [2021-01-16] Accepted protobuf 3.12.4-1 (source) into unstable (Laszlo Boszormenyi (GCS)) (signed by: Laszlo Boszormenyi)
  • [2020-12-18] Accepted protobuf 3.14.0-1 (source all amd64) into experimental, experimental (Debian FTP Masters) (signed by: Laszlo Boszormenyi)
  • [2020-12-14] Removed 4.0.0~rc2-1 from experimental (Debian FTP Masters)
  • [2020-08-13] Accepted protobuf 3.12.3-2~bpo10+1 (source all amd64) into buster-backports, buster-backports (Debian FTP Masters) (signed by: Praveen Arimbrathodiyil)
  • [2020-07-23] Accepted protobuf 4.0.0~rc2-1 (source) into experimental (Laszlo Boszormenyi (GCS)) (signed by: Laszlo Boszormenyi)
  • [2020-07-20] Accepted protobuf 4.0.0~rc1-1 (source all amd64) into experimental, experimental (Debian FTP Masters) (signed by: Laszlo Boszormenyi)
  • [2020-07-18] protobuf 3.12.3-2 MIGRATED to testing (Debian testing watch)
  • [2020-07-07] Accepted protobuf 3.12.3-2 (source) into unstable (Laszlo Boszormenyi (GCS)) (signed by: Laszlo Boszormenyi)
  • [2020-06-06] Accepted protobuf 3.12.3-1 (source) into experimental (Laszlo Boszormenyi (GCS)) (signed by: Laszlo Boszormenyi)
  • [2020-05-27] Accepted protobuf 3.12.2-1 (source) into experimental (Laszlo Boszormenyi (GCS)) (signed by: Laszlo Boszormenyi)
  • [2020-05-17] Accepted protobuf 3.12.0-1 (source) into experimental (Laszlo Boszormenyi (GCS)) (signed by: Laszlo Boszormenyi)
  • [2020-05-11] Accepted protobuf 3.12.0~rc1-1 (source all amd64) into experimental, experimental (Debian FTP Masters) (signed by: Laszlo Boszormenyi)
  • 1
  • 2
bugs [bug history graph]
  • all: 4
  • RC: 0
  • I&N: 2
  • M&W: 2
  • F&P: 0
  • patch: 1
links
  • homepage
  • lintian (4, 16)
  • buildd: logs, exp, checks, clang, reproducibility, cross
  • popcon
  • browse source code
  • edit tags
  • other distros
  • security tracker
  • debci
ubuntu Ubuntu logo [Information about Ubuntu for Debian Developers]
  • version: 3.12.4-1ubuntu7
  • 16 bugs
  • patches for 3.12.4-1ubuntu7

Debian Package Tracker — Copyright 2013-2018 The Distro Tracker Developers
Report problems to the tracker.debian.org pseudo-package in the Debian BTS.
Documentation — Bugs — Git Repository — Contributing