6.31.1
16 years ago
1 months ago
Known vulnerabilities in the protobuf package. This does not include vulnerabilities belonging to this package’s dependencies.
Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for freeVulnerability | Vulnerable Version |
---|---|
protobuf is a Google’s data interchange format Affected versions of this package are vulnerable to Uncontrolled Recursion when parsing untrusted Protocol Buffers data containing an excessive number of recursive groups, recursive messages, or a series of SGROUP tags. An attacker can provide crafted input that will corrupt the backend by exceeding the Python recursion limit and result in denial of service by crashing the application with a Note: This problem impacts only the pure-Python implementation of the protobuf-python backend and does not influence the CPython PyPi wheels, which, by default, do not utilize pure Python. How to fix Uncontrolled Recursion? Upgrade | [,4.25.8)[5.26.0rc1,5.29.5)[6.30.0rc1,6.31.1) |
protobuf is a Google’s data interchange format Affected versions of this package are vulnerable to Denial of Service (DoS) via the How to fix Denial of Service (DoS)? Upgrade | [,3.18.3)[3.19.0rc1,3.19.5)[3.20.0rc1,3.20.2)[4.0.0rc1,4.21.6) |