CVE-2026-0994

NameCVE-2026-0994
DescriptionA denial-of-service (DoS) vulnerability exists in google.protobuf.json_format.ParseDict() in Python, where the max_recursion_depth limit can be bypassed when parsing nested google.protobuf.Any messages. Due to missing recursion depth accounting inside the internal Any-handling logic, an attacker can supply deeply nested Any structures that bypass the intended recursion limit, eventually exhausting Python’s recursion stack and causing a RecursionError.
SourceCVE (at NVD; CERT, ENISA, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
Debian Bugs1126302

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
protobuf (PTS)bullseye3.12.4-1+deb11u1vulnerable
bookworm3.21.12-3vulnerable
trixie3.21.12-11vulnerable
forky, sid3.21.12-15vulnerable

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
protobufsource(unstable)(unfixed)1126302

Notes

https://github.com/protocolbuffers/protobuf/issues/25070
https://github.com/protocolbuffers/protobuf/pull/25239

Search for package or bug name: Reporting problems