CVE Vulnerabilities

CVE-2026-0994

Uncontrolled Recursion

Published: Jan 23, 2026 | Modified: Jan 26, 2026
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
RedHat/V2
RedHat/V3
7.5 IMPORTANT
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

A denial-of-service (DoS) vulnerability exists in google.protobuf.json_format.ParseDict() in Python, where the max_recursion_depth limit can be bypassed when parsing nested google.protobuf.Any messages.

Due to missing recursion depth accounting inside the internal Any-handling logic, an attacker can supply deeply nested Any structures that bypass the intended recursion limit, eventually exhausting Python’s recursion stack and causing a RecursionError.

Weakness

The product does not properly control the amount of recursion that takes place, consuming excessive resources, such as allocated memory or the program stack.

Affected Software

NameVendorStart VersionEnd Version
Red Hat Ansible Automation Platform 2.5 for RHEL 8RedHatpython3.12-protobuf-0:5.29.6-1.el8ap*
Red Hat Ansible Automation Platform 2.5 for RHEL 9RedHatpython3.12-protobuf-0:5.29.6-1.el9ap*
Red Hat Ansible Automation Platform 2.6 for RHEL 9RedHatpython3.12-protobuf-0:5.29.6-1.el9ap*
Red Hat Enterprise Linux 10RedHatprotobuf-0:3.19.6-15.el10_1*
Red Hat Enterprise Linux 10.0 Extended Update SupportRedHatprotobuf-0:3.19.6-11.el10_0.1*
Red Hat Enterprise Linux 9RedHatprotobuf-0:3.14.0-17.el9_7*
Red Hat Enterprise Linux 9.0 Update Services for SAP SolutionsRedHatprotobuf-0:3.14.0-9.el9_0.1*
Red Hat Enterprise Linux 9.2 Update Services for SAP SolutionsRedHatprotobuf-0:3.14.0-13.el9_2.1*
Red Hat Enterprise Linux 9.4 Extended Update SupportRedHatprotobuf-0:3.14.0-13.el9_4.1*
Red Hat Enterprise Linux 9.6 Extended Update SupportRedHatprotobuf-0:3.14.0-16.el9_6.1*
Red Hat AI Inference Server 3.2RedHatrhaiis/vllm-cuda-rhel9:sha256:dcb9d1cd005c40b6db6f893e56419e383b9dcc0d38315605cb1457e2af5354f7*
Red Hat AI Inference Server 3.2RedHatrhaiis/vllm-rocm-rhel9:sha256:53007894763e03f609c35c727cb738db3c2130b19fa0e1069c24240e0870fb7a*
ProtobufUbuntudevel*
ProtobufUbuntuesm-infra/bionic*
ProtobufUbuntuesm-infra/focal*
ProtobufUbuntujammy*
ProtobufUbuntunoble*
ProtobufUbuntuquesting*
ProtobufUbuntuupstream*

Potential Mitigations

References