Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2026-0994

Опубликовано: 23 янв. 2026
Источник: debian

Описание

A denial-of-service (DoS) vulnerability exists in google.protobuf.json_format.ParseDict() in Python, where the max_recursion_depth limit can be bypassed when parsing nested google.protobuf.Any messages. Due to missing recursion depth accounting inside the internal Any-handling logic, an attacker can supply deeply nested Any structures that bypass the intended recursion limit, eventually exhausting Python’s recursion stack and causing a RecursionError.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
protobuffixed3.25.7-1experimentalpackage
protobufunfixedpackage
protobufno-dsatrixiepackage
protobufno-dsabookwormpackage

Примечания

  • https://github.com/protocolbuffers/protobuf/issues/25070

  • https://github.com/protocolbuffers/protobuf/pull/25239

Связанные уязвимости

ubuntu
15 дней назад

A denial-of-service (DoS) vulnerability exists in google.protobuf.json_format.ParseDict() in Python, where the max_recursion_depth limit can be bypassed when parsing nested google.protobuf.Any messages. Due to missing recursion depth accounting inside the internal Any-handling logic, an attacker can supply deeply nested Any structures that bypass the intended recursion limit, eventually exhausting Python’s recursion stack and causing a RecursionError.

nvd
15 дней назад

A denial-of-service (DoS) vulnerability exists in google.protobuf.json_format.ParseDict() in Python, where the max_recursion_depth limit can be bypassed when parsing nested google.protobuf.Any messages. Due to missing recursion depth accounting inside the internal Any-handling logic, an attacker can supply deeply nested Any structures that bypass the intended recursion limit, eventually exhausting Python’s recursion stack and causing a RecursionError.

suse-cvrf
3 дня назад

Security update for protobuf

github
15 дней назад

protobuf affected by a JSON recursion depth bypass