CVE-2025-4565 Affecting protobuf package, versions *


Severity

Recommended
low

Based on default assessment until relevant scores are available.

Threat Intelligence

EPSS
0.06% (18th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-DEBIAN13-PROTOBUF-10389907
  • published19 Jun 2025
  • disclosed16 Jun 2025

Introduced: 16 Jun 2025

NewCVE-2025-4565  (opens in a new tab)

How to fix?

There is no fixed version for Debian:13 protobuf.

NVD Description

Note: Versions mentioned in the description apply only to the upstream protobuf package and not the protobuf package as distributed by Debian. See How to fix? for Debian:13 relevant fixed versions and status.

Any project that uses Protobuf Pure-Python backend to parse untrusted Protocol Buffers data containing an arbitrary number of recursive groups, recursive messages or a series of SGROUP tags can be corrupted by exceeding the Python recursion limit. This can result in a Denial of service by crashing the application with a RecursionError. We recommend upgrading to version =>6.31.1 or beyond commit 17838beda2943d08b8a9d4df5b68f5f04f26d901

CVSS Base Scores

version 3.1