Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

openSUSE-SU-2026:20390-1

Опубликовано: 18 мар. 2026
Источник: suse-cvrf

Описание

Security update for protobuf

This update for protobuf fixes the following issues:

Security fixes:

  • CVE-2025-4565: Fixed parsing of untrusted Protocol Buffers data containing an arbitrary number of recursive groups or messages that could lead to crash due to RecursionError (bsc#1244663).
  • CVE-2026-0994: Fixed google.protobuf.Any recursion depth bypass in Python json_format.ParseDict (bsc#1257173).

Other fixes:

  • Fixed import issues of reverse-dependency packages within the google namespace (bsc#1244918).

Список пакетов

openSUSE Leap 16.0
libprotobuf-lite28_3_0-28.3-160000.3.1
libprotobuf28_3_0-28.3-160000.3.1
libprotoc28_3_0-28.3-160000.3.1
libutf8_range-28_3_0-28.3-160000.3.1
protobuf-devel-28.3-160000.3.1
protobuf-java-28.3-160000.3.1
protobuf-java-bom-28.3-160000.3.1
protobuf-java-javadoc-28.3-160000.3.1
protobuf-java-parent-28.3-160000.3.1
python313-protobuf-5.28.3-160000.3.1

Описание

Any project that uses Protobuf Pure-Python backend to parse untrusted Protocol Buffers data containing an arbitrary number of recursive groups, recursive messages or a series of SGROUP tags can be corrupted by exceeding the Python recursion limit. This can result in a Denial of service by crashing the application with a RecursionError. We recommend upgrading to version =>6.31.1 or beyond commit 17838beda2943d08b8a9d4df5b68f5f04f26d901


Затронутые продукты
openSUSE Leap 16.0:libprotobuf-lite28_3_0-28.3-160000.3.1
openSUSE Leap 16.0:libprotobuf28_3_0-28.3-160000.3.1
openSUSE Leap 16.0:libprotoc28_3_0-28.3-160000.3.1
openSUSE Leap 16.0:libutf8_range-28_3_0-28.3-160000.3.1

Ссылки

Описание

A denial-of-service (DoS) vulnerability exists in google.protobuf.json_format.ParseDict() in Python, where the max_recursion_depth limit can be bypassed when parsing nested google.protobuf.Any messages. Due to missing recursion depth accounting inside the internal Any-handling logic, an attacker can supply deeply nested Any structures that bypass the intended recursion limit, eventually exhausting Python's recursion stack and causing a RecursionError.


Затронутые продукты
openSUSE Leap 16.0:libprotobuf-lite28_3_0-28.3-160000.3.1
openSUSE Leap 16.0:libprotobuf28_3_0-28.3-160000.3.1
openSUSE Leap 16.0:libprotoc28_3_0-28.3-160000.3.1
openSUSE Leap 16.0:libutf8_range-28_3_0-28.3-160000.3.1

Ссылки