Protocol Buffers - Google's data interchange format
Add max_recursion_depth parameter to json_format Parse/ParseDict functions to prevent denial-of-service attacks via deeply nested protobuf messages. The fix also changes _ConvertAnyMessage to use ConvertMessage directly, ensuring recursion depth is properly tracked for nested Any messages. Upstream PR: https://github.com/protocolbuffers/protobuf/pull/25239 New patches: - protobuf-3.19-CVE-2026-0994-nested-any-recursion.patch - protobuf-3.19-CVE-2026-0994-test.patch Generated with [Claude Code](https://claude.ai/code) Resolves: RHEL-144062 Signed-off-by: Adrian Reber <areber@redhat.com> |
||
|---|---|---|
| tests | ||
| .gitignore | ||
| disable-tests-on-32-bit-systems.patch | ||
| ftdetect-proto.vim | ||
| gating.yaml | ||
| protobuf-3.14-disable-IoTest.LargeOutput.patch | ||
| protobuf-3.19-CVE-2026-0994-nested-any-recursion.patch | ||
| protobuf-3.19-CVE-2026-0994-test.patch | ||
| protobuf-3.19.4-jre17-add-opens.patch | ||
| protobuf-3.19.4-python3.11.patch | ||
| protobuf-init.el | ||
| protobuf.spec | ||
| protoc.1 | ||
| rpminspect.yaml | ||
| sources | ||