Skip to content

protobuf-3.20.3-cp39-cp39-manylinux_2_5_x86_64.manylinux1_x86_64.whl: 1 vulnerabilities (highest severity is: 7.5) #5800

@mend-for-github-com

Description

@mend-for-github-com
Vulnerable Library - protobuf-3.20.3-cp39-cp39-manylinux_2_5_x86_64.manylinux1_x86_64.whl

No project description provided

Library home page: https://files.pythonhosted.org/packages/c7/df/ec3ecb8c940b36121c7b77c10acebf3d1c736498aa2f1fe3b6231ee44e76/protobuf-3.20.3-cp39-cp39-manylinux_2_5_x86_64.manylinux1_x86_64.whl

Path to dependency file: /examples/trace-analytics-sample-app/sample-app/requirements.txt

Path to vulnerable library: /tmp/ws-ua_20250625160412_GPPNBZ/python_RMRNMG/202506251604151/env/lib/python3.9/site-packages/protobuf-3.20.3.dist-info

Found in HEAD commit: eed21ce11a1f5e4c1671583fc8d6f340caaa6b71

Vulnerabilities

Vulnerability Severity CVSS Dependency Type Fixed in (protobuf version) Remediation Possible**
CVE-2025-4565 High 7.5 protobuf-3.20.3-cp39-cp39-manylinux_2_5_x86_64.manylinux1_x86_64.whl Direct 4.25.8

**In some cases, Remediation PR cannot be created automatically for a vulnerability despite the availability of remediation

Details

CVE-2025-4565

Vulnerable Library - protobuf-3.20.3-cp39-cp39-manylinux_2_5_x86_64.manylinux1_x86_64.whl

No project description provided

Library home page: https://files.pythonhosted.org/packages/c7/df/ec3ecb8c940b36121c7b77c10acebf3d1c736498aa2f1fe3b6231ee44e76/protobuf-3.20.3-cp39-cp39-manylinux_2_5_x86_64.manylinux1_x86_64.whl

Path to dependency file: /examples/trace-analytics-sample-app/sample-app/requirements.txt

Path to vulnerable library: /tmp/ws-ua_20250625160412_GPPNBZ/python_RMRNMG/202506251604151/env/lib/python3.9/site-packages/protobuf-3.20.3.dist-info

Dependency Hierarchy:

  • protobuf-3.20.3-cp39-cp39-manylinux_2_5_x86_64.manylinux1_x86_64.whl (Vulnerable Library)

Found in HEAD commit: eed21ce11a1f5e4c1671583fc8d6f340caaa6b71

Found in base branch: main

Vulnerability Details

Any project that uses Protobuf Pure-Python backend to parse untrusted Protocol Buffers data containing an arbitrary number of recursive groups, recursive messages or a series of SGROUP tags can be corrupted by exceeding the Python recursion limit. This can result in a Denial of service by crashing the application with a RecursionError. We recommend upgrading to version =>6.31.1 or beyond commit 17838beda2943d08b8a9d4df5b68f5f04f26d901

Publish Date: 2025-06-16

URL: CVE-2025-4565

CVSS 3 Score Details (7.5)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: None
    • Integrity Impact: None
    • Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: GHSA-8qvm-5x2c-j2w7

Release Date: 2025-06-16

Fix Resolution: 4.25.8

⛑️ Automatic Remediation will be attempted for this issue.


⛑️Automatic Remediation will be attempted for this issue.

Metadata

Metadata

Assignees

Type

No type

Projects

Status

Done

Milestone

Relationships

None yet

Development

No branches or pull requests

Issue actions