protobuf@4.21.5 vulnerabilities

  • latest version

    6.31.1

  • latest non vulnerable version

  • first published

    16 years ago

  • latest version published

    1 months ago

  • licenses detected

  • Direct Vulnerabilities

    Known vulnerabilities in the protobuf package. This does not include vulnerabilities belonging to this package’s dependencies.

    How to fix?

    Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

    Fix for free
    VulnerabilityVulnerable Version
    • H
    Uncontrolled Recursion

    protobuf is a Google’s data interchange format

    Affected versions of this package are vulnerable to Uncontrolled Recursion when parsing untrusted Protocol Buffers data containing an excessive number of recursive groups, recursive messages, or a series of SGROUP tags. An attacker can provide crafted input that will corrupt the backend by exceeding the Python recursion limit and result in denial of service by crashing the application with a RecursionError.

    Note: This problem impacts only the pure-Python implementation of the protobuf-python backend and does not influence the CPython PyPi wheels, which, by default, do not utilize pure Python.

    How to fix Uncontrolled Recursion?

    Upgrade protobuf to version 4.25.8, 5.29.5, 6.31.1 or higher.

    [,4.25.8)[5.26.0rc1,5.29.5)[6.30.0rc1,6.31.1)
    • M
    Denial of Service (DoS)

    protobuf is a Google’s data interchange format

    Affected versions of this package are vulnerable to Denial of Service (DoS) via the MessageSet type, by allowing an attacker to send specially crafted message with multiple key-value per elements, therefore creating parsing issues against services which receive unsanitized input.

    How to fix Denial of Service (DoS)?

    Upgrade protobuf to version 3.18.3, 3.19.5, 3.20.2, 4.21.6 or higher.

    [,3.18.3)[3.19.0rc1,3.19.5)[3.20.0rc1,3.20.2)[4.0.0rc1,4.21.6)