Bug 2432398 (CVE-2026-0994) - CVE-2026-0994 python: protobuf: Protobuf: Denial of Service due to recursion depth bypass
Summary: CVE-2026-0994 python: protobuf: Protobuf: Denial of Service due to recursion ...
Keywords:
Status: NEW
Alias: CVE-2026-0994
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
high
high
Target Milestone: ---
Assignee: Product Security DevOps Team
QA Contact:
URL:
Whiteboard:
Depends On: 2432842 2432843 2432844 2432845
Blocks:
TreeView+ depends on / blocked
 
Reported: 2026-01-23 16:03 UTC by OSIDB Bzimport
Modified: 2026-03-06 10:55 UTC (History)
10 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2026:3059 0 None None None 2026-02-23 08:24:37 UTC
Red Hat Product Errata RHSA-2026:3094 0 None None None 2026-02-23 15:40:26 UTC
Red Hat Product Errata RHSA-2026:3095 0 None None None 2026-02-23 16:13:29 UTC
Red Hat Product Errata RHSA-2026:3097 0 None None None 2026-02-23 15:59:11 UTC
Red Hat Product Errata RHSA-2026:3218 0 None None None 2026-02-24 15:31:09 UTC
Red Hat Product Errata RHSA-2026:3219 0 None None None 2026-02-24 16:19:20 UTC
Red Hat Product Errata RHSA-2026:3220 0 None None None 2026-02-24 16:05:22 UTC
Red Hat Product Errata RHSA-2026:3958 0 None None None 2026-03-06 10:13:30 UTC
Red Hat Product Errata RHSA-2026:3959 0 None None None 2026-03-06 10:55:39 UTC

Description OSIDB Bzimport 2026-01-23 16:03:26 UTC
A denial-of-service (DoS) vulnerability exists in google.protobuf.json_format.ParseDict() in Python, where the max_recursion_depth limit can be bypassed when parsing nested google.protobuf.Any messages.

Due to missing recursion depth accounting inside the internal Any-handling logic, an attacker can supply deeply nested Any structures that bypass the intended recursion limit, eventually exhausting Python’s recursion stack and causing a RecursionError.

Comment 2 errata-xmlrpc 2026-02-23 08:24:36 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.4 Extended Update Support

Via RHSA-2026:3059 https://access.redhat.com/errata/RHSA-2026:3059

Comment 3 errata-xmlrpc 2026-02-23 15:40:24 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 10

Via RHSA-2026:3094 https://access.redhat.com/errata/RHSA-2026:3094

Comment 4 errata-xmlrpc 2026-02-23 15:59:10 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions

Via RHSA-2026:3097 https://access.redhat.com/errata/RHSA-2026:3097

Comment 5 errata-xmlrpc 2026-02-23 16:13:28 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2026:3095 https://access.redhat.com/errata/RHSA-2026:3095

Comment 6 errata-xmlrpc 2026-02-24 15:31:08 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 10.0 Extended Update Support

Via RHSA-2026:3218 https://access.redhat.com/errata/RHSA-2026:3218

Comment 7 errata-xmlrpc 2026-02-24 16:05:21 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.2 Update Services for SAP Solutions

Via RHSA-2026:3220 https://access.redhat.com/errata/RHSA-2026:3220

Comment 8 errata-xmlrpc 2026-02-24 16:19:18 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.6 Extended Update Support

Via RHSA-2026:3219 https://access.redhat.com/errata/RHSA-2026:3219

Comment 9 errata-xmlrpc 2026-03-06 10:13:29 UTC
This issue has been addressed in the following products:

  Red Hat Ansible Automation Platform 2.6 for RHEL 9
  Red Hat Ansible Automation Platform 2.6 for RHEL 10

Via RHSA-2026:3958 https://access.redhat.com/errata/RHSA-2026:3958

Comment 10 errata-xmlrpc 2026-03-06 10:55:37 UTC
This issue has been addressed in the following products:

  Red Hat Ansible Automation Platform 2.5 for RHEL 8
  Red Hat Ansible Automation Platform 2.5 for RHEL 9

Via RHSA-2026:3959 https://access.redhat.com/errata/RHSA-2026:3959


Note You need to log in before you can comment on or make changes to this bug.