{"schema_version":"1.7.2","id":"OESA-2025-1799","modified":"2025-07-11T12:24:06Z","published":"2025-07-11T12:24:06Z","upstream":["CVE-2025-4565"],"summary":"protobuf security update","details":"Security Fix(es):\n\nAny project that uses Protobuf Pure-Python backend to parse untrusted Protocol Buffers data containing an arbitrary number of recursive groups, recursive messages or a series of SGROUP tags can be corrupted by exceeding the Python recursion limit. This can result in a Denial of service by crashing the application with a RecursionError. We recommend upgrading to version =\u0026gt;6.31.1 or beyond commit 17838beda2943d08b8a9d4df5b68f5f04f26d901(CVE-2025-4565)","affected":[{"package":{"ecosystem":"openEuler:24.03-LTS-SP2","name":"protobuf","purl":"pkg:rpm/openEuler/protobuf\u0026distro=openEuler-24.03-LTS-SP2"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"25.1-11.oe2403sp2"}]}],"ecosystem_specific":{"aarch64":["protobuf-25.1-11.oe2403sp2.aarch64.rpm","protobuf-compiler-25.1-11.oe2403sp2.aarch64.rpm","protobuf-debuginfo-25.1-11.oe2403sp2.aarch64.rpm","protobuf-debugsource-25.1-11.oe2403sp2.aarch64.rpm","protobuf-devel-25.1-11.oe2403sp2.aarch64.rpm","protobuf-lite-25.1-11.oe2403sp2.aarch64.rpm","protobuf-lite-devel-25.1-11.oe2403sp2.aarch64.rpm"],"noarch":["protobuf-bom-25.1-11.oe2403sp2.noarch.rpm","protobuf-java-25.1-11.oe2403sp2.noarch.rpm","protobuf-java-util-25.1-11.oe2403sp2.noarch.rpm","protobuf-javadoc-25.1-11.oe2403sp2.noarch.rpm","protobuf-javalite-25.1-11.oe2403sp2.noarch.rpm","protobuf-parent-25.1-11.oe2403sp2.noarch.rpm","python3-protobuf-25.1-11.oe2403sp2.noarch.rpm"],"src":["protobuf-25.1-11.oe2403sp2.src.rpm"],"x86_64":["protobuf-25.1-11.oe2403sp2.x86_64.rpm","protobuf-compiler-25.1-11.oe2403sp2.x86_64.rpm","protobuf-debuginfo-25.1-11.oe2403sp2.x86_64.rpm","protobuf-debugsource-25.1-11.oe2403sp2.x86_64.rpm","protobuf-devel-25.1-11.oe2403sp2.x86_64.rpm","protobuf-lite-25.1-11.oe2403sp2.x86_64.rpm","protobuf-lite-devel-25.1-11.oe2403sp2.x86_64.rpm"]}}],"references":[{"type":"ADVISORY","url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1799"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-4565"}],"database_specific":{"severity":"Medium"}}