Bug 2376750 - CVE-2025-53605 rust: Protobuf: Uncontrolled Recursion Vulnerability [fedora-41]
Summary: CVE-2025-53605 rust: Protobuf: Uncontrolled Recursion Vulnerability [fedora-41]
Keywords:
Status: CLOSED NOTABUG
Alias: None
Product: Fedora
Classification: Fedora
Component: rust
Version: 41
Hardware: Unspecified
OS: Unspecified
medium
medium
Target Milestone: ---
Assignee: Rust SIG
QA Contact: Fedora Extras Quality Assurance
URL:
Whiteboard: {"flaws": ["23cea8bd-1aef-454d-b827-5...
Depends On:
Blocks: CVE-2025-53605
TreeView+ depends on / blocked
 
Reported: 2025-07-07 09:14 UTC by Michal Findra
Modified: 2025-07-07 18:52 UTC (History)
6 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed: 2025-07-07 18:52:25 UTC
Type: ---
Embargoed:


Attachments (Terms of Use)

Description Michal Findra 2025-07-07 09:14:56 UTC
More information about this security flaw is available in the following bug:

https://bugzilla.redhat.com/show_bug.cgi?id=2376493

Disclaimer: Community trackers are created by Red Hat Product Security team on a best effort basis. Package maintainers are required to ascertain if the flaw indeed affects their package, before starting the update process.

Comment 1 Josh Stone 2025-07-07 18:52:25 UTC
The only use of protobuf is in rust-analyzer via scip (https://crates.io/crates/scip) to *output* files, so an untrusted-input vulnerability doesn't apply.

(Also, in general, all input to rust-analyzer is considered trusted.)


Note You need to log in before you can comment on or make changes to this bug.