{"schema_version":"1.7.2","id":"OESA-2025-1714","modified":"2025-07-04T14:42:41Z","published":"2025-07-04T14:42:41Z","upstream":["CVE-2025-4565"],"summary":"protobuf security update","details":"Security Fix(es):\n\nAny project that uses Protobuf Pure-Python backend to parse untrusted Protocol Buffers data containing an arbitrary number of recursive groups, recursive messages or a series of SGROUP tags can be corrupted by exceeding the Python recursion limit. This can result in a Denial of service by crashing the application with a RecursionError. We recommend upgrading to version =\u0026gt;6.31.1 or beyond commit 17838beda2943d08b8a9d4df5b68f5f04f26d901(CVE-2025-4565)","affected":[{"package":{"ecosystem":"openEuler:22.03-LTS-SP4","name":"protobuf","purl":"pkg:rpm/openEuler/protobuf\u0026distro=openEuler-22.03-LTS-SP4"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3.14.0-9.oe2203sp4"}]}],"ecosystem_specific":{"aarch64":["protobuf-3.14.0-9.oe2203sp4.aarch64.rpm","protobuf-compiler-3.14.0-9.oe2203sp4.aarch64.rpm","protobuf-debuginfo-3.14.0-9.oe2203sp4.aarch64.rpm","protobuf-debugsource-3.14.0-9.oe2203sp4.aarch64.rpm","protobuf-devel-3.14.0-9.oe2203sp4.aarch64.rpm","protobuf-lite-3.14.0-9.oe2203sp4.aarch64.rpm","protobuf-lite-devel-3.14.0-9.oe2203sp4.aarch64.rpm"],"noarch":["protobuf-bom-3.14.0-9.oe2203sp4.noarch.rpm","protobuf-java-3.14.0-9.oe2203sp4.noarch.rpm","protobuf-java-util-3.14.0-9.oe2203sp4.noarch.rpm","protobuf-javadoc-3.14.0-9.oe2203sp4.noarch.rpm","protobuf-javalite-3.14.0-9.oe2203sp4.noarch.rpm","protobuf-parent-3.14.0-9.oe2203sp4.noarch.rpm","python3-protobuf-3.14.0-9.oe2203sp4.noarch.rpm"],"src":["protobuf-3.14.0-9.oe2203sp4.src.rpm"],"x86_64":["protobuf-3.14.0-9.oe2203sp4.x86_64.rpm","protobuf-compiler-3.14.0-9.oe2203sp4.x86_64.rpm","protobuf-debuginfo-3.14.0-9.oe2203sp4.x86_64.rpm","protobuf-debugsource-3.14.0-9.oe2203sp4.x86_64.rpm","protobuf-devel-3.14.0-9.oe2203sp4.x86_64.rpm","protobuf-lite-3.14.0-9.oe2203sp4.x86_64.rpm","protobuf-lite-devel-3.14.0-9.oe2203sp4.x86_64.rpm"]}}],"references":[{"type":"ADVISORY","url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1714"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-4565"}],"database_specific":{"severity":"Medium"}}