CVE Vulnerabilities

CVE-2025-4565

Uncontrolled Recursion

Published: Jun 16, 2025 | Modified: Aug 14, 2025
CVSS 3.x
5.3
MEDIUM
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
CVSS 2.x
RedHat/V2
RedHat/V3
5.3 MODERATE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

Any project that uses Protobuf Pure-Python backend to parse untrusted Protocol Buffers data containing an arbitrary number of recursive groups, recursive messages or a series of SGROUP tags can be corrupted by exceeding the Python recursion limit. This can result in a Denial of service by crashing the application with a RecursionError. We recommend upgrading to version =>6.31.1 or beyond commit 17838beda2943d08b8a9d4df5b68f5f04f26d901

Weakness

The product does not properly control the amount of recursion that takes place, consuming excessive resources, such as allocated memory or the program stack.

Affected Software

NameVendorStart VersionEnd Version
Protobuf-pythonGoogle*4.25.8 (excluding)
Protobuf-pythonGoogle5.26.0 (including)5.29.5 (excluding)
Protobuf-pythonGoogle6.30.0 (including)6.31.1 (excluding)
Red Hat Ansible Automation Platform 2.6 for RHEL 9RedHatpython3.11-protobuf-0:4.25.8-1.el9ap*
Red Hat OpenShift Container Platform 4.19RedHatopenshift4/ose-dpu-intel-ipu-vsp-rhel9:v4.19.0-202507081507.p0.gb4d5e23.assembly.stream.el9*
ProtobufUbuntudevel*
ProtobufUbuntuesm-infra-legacy/trusty*
ProtobufUbuntuesm-infra/bionic*
ProtobufUbuntuesm-infra/focal*
ProtobufUbuntuesm-infra/xenial*
ProtobufUbuntujammy*
ProtobufUbuntunoble*
ProtobufUbuntuoracular*
ProtobufUbuntuplucky*
ProtobufUbuntuupstream*

Potential Mitigations

References