Skip to content

protobuf-3.19.5-cp39-cp39-manylinux_2_17_x86_64.manylinux2014_x86_64.whl: 1 vulnerabilities (highest severity is: 7.5) #5802

@mend-for-github-com

Description

@mend-for-github-com
Vulnerable Library - protobuf-3.19.5-cp39-cp39-manylinux_2_17_x86_64.manylinux2014_x86_64.whl

No project description provided

Library home page: https://files.pythonhosted.org/packages/7c/68/3bc155728fe545fdf0f8f4b2ba2214486e8c868970733ca8c0db210c1304/protobuf-3.19.5-cp39-cp39-manylinux_2_17_x86_64.manylinux2014_x86_64.whl

Path to dependency file: /release/smoke-tests/otel-span-exporter/requirements.txt

Path to vulnerable library: /tmp/ws-ua_20250624230947_SCCRMY/python_NPIBUL/202506242313561/env/lib/python3.9/site-packages/protobuf-3.19.5.dist-info

Found in HEAD commit: 11737630e7f3cd436ea02ab02582b0fab4a69e83

Vulnerabilities

Vulnerability Severity CVSS Dependency Type Fixed in (protobuf version) Remediation Possible**
CVE-2025-4565 High 7.5 protobuf-3.19.5-cp39-cp39-manylinux_2_17_x86_64.manylinux2014_x86_64.whl Direct 4.25.8

**In some cases, Remediation PR cannot be created automatically for a vulnerability despite the availability of remediation

Details

CVE-2025-4565

Vulnerable Library - protobuf-3.19.5-cp39-cp39-manylinux_2_17_x86_64.manylinux2014_x86_64.whl

No project description provided

Library home page: https://files.pythonhosted.org/packages/7c/68/3bc155728fe545fdf0f8f4b2ba2214486e8c868970733ca8c0db210c1304/protobuf-3.19.5-cp39-cp39-manylinux_2_17_x86_64.manylinux2014_x86_64.whl

Path to dependency file: /release/smoke-tests/otel-span-exporter/requirements.txt

Path to vulnerable library: /tmp/ws-ua_20250624230947_SCCRMY/python_NPIBUL/202506242313561/env/lib/python3.9/site-packages/protobuf-3.19.5.dist-info

Dependency Hierarchy:

  • protobuf-3.19.5-cp39-cp39-manylinux_2_17_x86_64.manylinux2014_x86_64.whl (Vulnerable Library)

Found in HEAD commit: 11737630e7f3cd436ea02ab02582b0fab4a69e83

Found in base branch: main

Vulnerability Details

Any project that uses Protobuf Pure-Python backend to parse untrusted Protocol Buffers data containing an arbitrary number of recursive groups, recursive messages or a series of SGROUP tags can be corrupted by exceeding the Python recursion limit. This can result in a Denial of service by crashing the application with a RecursionError. We recommend upgrading to version =>6.31.1 or beyond commit 17838beda2943d08b8a9d4df5b68f5f04f26d901

Publish Date: 2025-06-16

URL: CVE-2025-4565

CVSS 3 Score Details (7.5)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: None
    • Integrity Impact: None
    • Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: GHSA-8qvm-5x2c-j2w7

Release Date: 2025-06-16

Fix Resolution: 4.25.8

⛑️ Automatic Remediation will be attempted for this issue.


⛑️Automatic Remediation will be attempted for this issue.

Metadata

Metadata

Assignees

Type

No type

Projects

Status

Done

Milestone

Relationships

None yet

Development

No branches or pull requests

Issue actions