- 
                Notifications
    
You must be signed in to change notification settings  - Fork 0
 
Description
 Vulnerable Library - protobuf-5.29.1-cp38-abi3-manylinux2014_x86_64.whl
No project description provided
Library home page: https://files.pythonhosted.org/packages/04/52/c97c58a33b3d6c89a8138788576d372a90a6556f354799971c6b4d16d871/protobuf-5.29.1-cp38-abi3-manylinux2014_x86_64.whl
Path to dependency file: /python/packaging/classic
Path to vulnerable library: /tmp/ws-ua_20250911162230_THIROO/python_WJUNOV/20250911162252/protobuf-5.29.1-cp38-abi3-manylinux2014_x86_64.whl,/tmp/ws-ua_20250911162230_THIROO/python_WJUNOV/202509111623321/env/lib/python3.9/site-packages/protobuf-5.29.1.dist-info
Found in HEAD commit: eb4a123ac71f425039cbf2b066115e480b3e6cc6
Vulnerabilities
| Vulnerability | Severity | Dependency | Type | Fixed in (protobuf version) | Remediation Possible** | |
|---|---|---|---|---|---|---|
| CVE-2025-4565 | 7.5 | protobuf-5.29.1-cp38-abi3-manylinux2014_x86_64.whl | Direct | https://github.com/protocolbuffers/protobuf.git - v3.25.8 | ✅ | 
**In some cases, Remediation PR cannot be created automatically for a vulnerability despite the availability of remediation
Details
 CVE-2025-4565
Vulnerable Library - protobuf-5.29.1-cp38-abi3-manylinux2014_x86_64.whl
No project description provided
Library home page: https://files.pythonhosted.org/packages/04/52/c97c58a33b3d6c89a8138788576d372a90a6556f354799971c6b4d16d871/protobuf-5.29.1-cp38-abi3-manylinux2014_x86_64.whl
Path to dependency file: /python/packaging/classic
Path to vulnerable library: /tmp/ws-ua_20250911162230_THIROO/python_WJUNOV/20250911162252/protobuf-5.29.1-cp38-abi3-manylinux2014_x86_64.whl,/tmp/ws-ua_20250911162230_THIROO/python_WJUNOV/202509111623321/env/lib/python3.9/site-packages/protobuf-5.29.1.dist-info
Dependency Hierarchy:
- ❌ protobuf-5.29.1-cp38-abi3-manylinux2014_x86_64.whl (Vulnerable Library)
 
Found in HEAD commit: eb4a123ac71f425039cbf2b066115e480b3e6cc6
Found in base branch: master
Vulnerability Details
Any project that uses Protobuf Pure-Python backend to parse untrusted Protocol Buffers data containing an arbitrary number of recursive groups, recursive messages or a series of SGROUP tags can be corrupted by exceeding the Python recursion limit. This can result in a Denial of service by crashing the application with a RecursionError. We recommend upgrading to version =>6.31.1 or beyond commit 17838beda2943d08b8a9d4df5b68f5f04f26d901
Publish Date: 2025-06-16
URL: CVE-2025-4565
CVSS 3 Score Details (7.5)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
 - Attack Complexity: Low
 - Privileges Required: None
 - User Interaction: None
 - Scope: Unchanged
 
 - Impact Metrics:
- Confidentiality Impact: None
 - Integrity Impact: None
 - Availability Impact: High
 
 
Suggested Fix
Type: Upgrade version
Origin: protocolbuffers/protobuf@17838be
Release Date: 2025-06-16
Fix Resolution: https://github.com/protocolbuffers/protobuf.git - v3.25.8
⛑️ Automatic Remediation will be attempted for this issue.
⛑️Automatic Remediation will be attempted for this issue.