Skip to content

Update dependency protobuf to v4.25.8 [SECURITY] (master) #7

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Draft
wants to merge 1 commit into
base: master
Choose a base branch
from

Conversation

renovatebot-confluentinc[bot]
Copy link

For any questions/concerns about this PR, please review the Renovate Bot wiki/FAQs, or the #renovatebot Slack channel.

This PR contains the following updates:

Package Change Age Adoption Passing Confidence
protobuf ==4.24.4 -> ==4.25.8 age adoption passing confidence

Warning

Some dependencies could not be looked up. Check the warning logs for more information.

GitHub Vulnerability Alerts

CVE-2025-4565

Summary

Any project that uses Protobuf pure-Python backend to parse untrusted Protocol Buffers data containing an arbitrary number of recursive groups, recursive messages or a series of SGROUP tags can be corrupted by exceeding the Python recursion limit.

Reporter: Alexis Challande, Trail of Bits Ecosystem Security Team
[email protected]

Affected versions: This issue only affects the pure-Python implementation of protobuf-python backend. This is the implementation when PROTOCOL_BUFFERS_PYTHON_IMPLEMENTATION=python environment variable is set or the default when protobuf is used from Bazel or pure-Python PyPi wheels. CPython PyPi wheels do not use pure-Python by default.

This is a Python variant of a previous issue affecting protobuf-java.

Severity

This is a potential Denial of Service. Parsing nested protobuf data creates unbounded recursions that can be abused by an attacker.

Proof of Concept

For reproduction details, please refer to the unit tests decoder_test.py and message_test

Remediation and Mitigation

A mitigation is available now. Please update to the latest available versions of the following packages:

  • protobuf-python(4.25.8, 5.29.5, 6.31.1)

protobuf-python has a potential Denial of Service issue

CVE-2025-4565 / GHSA-8qvm-5x2c-j2w7

More information

Details

Summary

Any project that uses Protobuf pure-Python backend to parse untrusted Protocol Buffers data containing an arbitrary number of recursive groups, recursive messages or a series of SGROUP tags can be corrupted by exceeding the Python recursion limit.

Reporter: Alexis Challande, Trail of Bits Ecosystem Security Team
[email protected]

Affected versions: This issue only affects the pure-Python implementation of protobuf-python backend. This is the implementation when PROTOCOL_BUFFERS_PYTHON_IMPLEMENTATION=python environment variable is set or the default when protobuf is used from Bazel or pure-Python PyPi wheels. CPython PyPi wheels do not use pure-Python by default.

This is a Python variant of a previous issue affecting protobuf-java.

Severity

This is a potential Denial of Service. Parsing nested protobuf data creates unbounded recursions that can be abused by an attacker.

Proof of Concept

For reproduction details, please refer to the unit tests decoder_test.py and message_test

Remediation and Mitigation

A mitigation is available now. Please update to the latest available versions of the following packages:

  • protobuf-python(4.25.8, 5.29.5, 6.31.1)

Severity

  • CVSS Score: Unknown
  • Vector String: CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N

References

This data is provided by OSV and the GitHub Advisory Database (CC-BY 4.0).


Configuration

📅 Schedule: Branch creation - "" (UTC), Automerge - At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, check this box

This PR has been generated by Renovate Bot.

vdesabou added a commit that referenced this pull request Jul 15, 2025
* airlock sync (#1)

* airlock sync

* empty commit

* Update docker-compose.plaintext.proxy.yml

* Update docker-compose.plaintext.yml

* Update docker-compose.plaintext.backup-and-restore.yml

* Update docker-compose.plaintext.proxy.backup-and-restore.yml

* Update connect-onprem-to-cloud.sh

* Update connect-onprem-to-cloud-avro.sh

* Update connect-onprem-to-cloud-avro-with-sr-basic-auth.sh

* Update cli_function.sh

* Update get-number-records.sh

* Update heap-dump.sh

* Update snippets.sh

* Update create-or-update.sh

* Update bashly.yml

* Features3 (#4)

* reproduction-models

* fix self certs

* 2.00.076.00.20240701.1

* wip (#5)

* update

* bump to 3.24.4

* fix for jdk17

* fix schema

* cleanup pushtopic

* Add HTTP Sink V2 Fully Managed example vdesabou#5885

* wip (#6)

* minor

* minor

* delete topic

* Add HTTP Source V2 Fully Managed example vdesabou#5884

* sleep 60

* fix

* wip (#7)

* debug

* MyLeadPushTopicsV2

* wip

* 7.7.1

* playground connector show-lag

* wip (#8)

* doing auth again

* 3.25.1

* wip

* wip

* jdk 17 fix

* 16092024 2 (#9)

* Add example for jsonata vdesabou#5756

* check does not work with CI for some reasons, only relying on lag

* Issue with adding tcpdump vdesabou#5917

* wip (vdesabou#10)

* separate name for cloud

* delete

* Add Google Cloud Functions Gen 2 Sink Connector vdesabou#5869

* update (vdesabou#12)

* 26092024 2 (vdesabou#13)

* Add --initial-state option to "playground connector create-or-update" vdesabou#5929

* faker location

* wip (vdesabou#14)

* 3.5.3

* playground connector show-lag issue when used with --environment ccloud example vdesabou#5943

* remove connect-jms-sag-um-source and connect-jms-sag-um-sink examples as Docker image is no longer provided by SAG vdesabou#5949

* wip

* wip (vdesabou#15)

* vdesabou#5187

* delete retry

* test

* wip

* Add custom connector example for Tabular Iceberg sink vdesabou#5971

* minor

* topic produce: make nb_max_messages_to_generate configurable vdesabou#5976

* fix on linux
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

0 participants