CVE-2025-4565 Affecting grafana-oncall package, versions <1.16.3-r0


Severity

Recommended
low

Based on default assessment until relevant scores are available.

Threat Intelligence

EPSS
0.06% (18th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-CHAINGUARDLATEST-GRAFANAONCALL-10379807
  • published18 Jun 2025
  • disclosed16 Jun 2025

Introduced: 16 Jun 2025

NewCVE-2025-4565  (opens in a new tab)

How to fix?

Upgrade Chainguard grafana-oncall to version 1.16.3-r0 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream grafana-oncall package and not the grafana-oncall package as distributed by Chainguard. See How to fix? for Chainguard relevant fixed versions and status.

Any project that uses Protobuf Pure-Python backend to parse untrusted Protocol Buffers data containing an arbitrary number of recursive groups, recursive messages or a series of SGROUP tags can be corrupted by exceeding the Python recursion limit. This can result in a Denial of service by crashing the application with a RecursionError. We recommend upgrading to version =>6.31.1 or beyond commit 17838beda2943d08b8a9d4df5b68f5f04f26d901

CVSS Base Scores

version 3.1