Описание
Security update for protobuf
This update for protobuf fixes the following issues:
Security fixes:
- CVE-2025-4565: Fixed parsing of untrusted Protocol Buffers data containing an arbitrary number of recursive groups or messages that could lead to crash due to RecursionError (bsc#1244663).
- CVE-2026-0994: Fixed google.protobuf.Any recursion depth bypass in Python json_format.ParseDict (bsc#1257173).
Other fixes:
- Fixed import issues of reverse-dependency packages within the google namespace (bsc#1244918).
Список пакетов
openSUSE Leap 16.0
Ссылки
- SUSE Security Ratings
- SUSE Bug 1244663
- SUSE Bug 1244918
- SUSE Bug 1257173
- SUSE CVE CVE-2025-4565 page
- SUSE CVE CVE-2026-0994 page
Описание
Any project that uses Protobuf Pure-Python backend to parse untrusted Protocol Buffers data containing an arbitrary number of recursive groups, recursive messages or a series of SGROUP tags can be corrupted by exceeding the Python recursion limit. This can result in a Denial of service by crashing the application with a RecursionError. We recommend upgrading to version =>6.31.1 or beyond commit 17838beda2943d08b8a9d4df5b68f5f04f26d901
Затронутые продукты
Ссылки
- CVE-2025-4565
- SUSE Bug 1244663
Описание
A denial-of-service (DoS) vulnerability exists in google.protobuf.json_format.ParseDict() in Python, where the max_recursion_depth limit can be bypassed when parsing nested google.protobuf.Any messages. Due to missing recursion depth accounting inside the internal Any-handling logic, an attacker can supply deeply nested Any structures that bypass the intended recursion limit, eventually exhausting Python's recursion stack and causing a RecursionError.
Затронутые продукты
Ссылки
- CVE-2026-0994
- SUSE Bug 1257173