Aspect-Based-Sentiment-Analysis icon indicating copy to clipboard operation
Aspect-Based-Sentiment-Analysis copied to clipboard

protobuf-3.20.3-cp37-cp37m-manylinux_2_5_x86_64.manylinux1_x86_64.whl: 1 vulnerabilities (highest severity is: 7.5)

Open mend-for-github-com[bot] opened this issue 4 months ago • 0 comments

Vulnerable Library - protobuf-3.20.3-cp37-cp37m-manylinux_2_5_x86_64.manylinux1_x86_64.whl

No project description provided

Library home page: https://files.pythonhosted.org/packages/4c/12/62e1d5505c172e1a7f803d83b0b1693f7952c3c271eb2f155703012ae67a/protobuf-3.20.3-cp37-cp37m-manylinux_2_5_x86_64.manylinux1_x86_64.whl

Path to dependency file: /tmp/ws-scm/Aspect-Based-Sentiment-Analysis

Path to vulnerable library: /tmp/ws-scm/Aspect-Based-Sentiment-Analysis,/.ws-temp-THFHIH-requirements.txt

Found in HEAD commit: d952432cb8d2cb53d7a0c189dc2d16fc535cdc75

Vulnerabilities

Vulnerability Severity CVSS Dependency Type Fixed in (protobuf version) Remediation Possible**
CVE-2025-4565 High 7.5 protobuf-3.20.3-cp37-cp37m-manylinux_2_5_x86_64.manylinux1_x86_64.whl Direct 6.31.1 ✅

**In some cases, Remediation PR cannot be created automatically for a vulnerability despite the availability of remediation

Details

CVE-2025-4565

Vulnerable Library - protobuf-3.20.3-cp37-cp37m-manylinux_2_5_x86_64.manylinux1_x86_64.whl

No project description provided

Library home page: https://files.pythonhosted.org/packages/4c/12/62e1d5505c172e1a7f803d83b0b1693f7952c3c271eb2f155703012ae67a/protobuf-3.20.3-cp37-cp37m-manylinux_2_5_x86_64.manylinux1_x86_64.whl

Path to dependency file: /tmp/ws-scm/Aspect-Based-Sentiment-Analysis

Path to vulnerable library: /tmp/ws-scm/Aspect-Based-Sentiment-Analysis,/.ws-temp-THFHIH-requirements.txt

Dependency Hierarchy:

  • :x: protobuf-3.20.3-cp37-cp37m-manylinux_2_5_x86_64.manylinux1_x86_64.whl (Vulnerable Library)

Found in HEAD commit: d952432cb8d2cb53d7a0c189dc2d16fc535cdc75

Found in base branch: master

Vulnerability Details

Any project that uses Protobuf Pure-Python backend to parse untrusted Protocol Buffers data containing an arbitrary number of recursive groups, recursive messages or a series of SGROUP tags can be corrupted by exceeding the Python recursion limit. This can result in a Denial of service by crashing the application with a RecursionError. We recommend upgrading to version =>6.31.1 or beyond commit 17838beda2943d08b8a9d4df5b68f5f04f26d901

Publish Date: 2025-06-16

URL: CVE-2025-4565

CVSS 3 Score Details (7.5)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: None
    • Integrity Impact: None
    • Availability Impact: High
For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Release Date: 2025-06-16

Fix Resolution: 6.31.1

:rescue_worker_helmet: Automatic Remediation will be attempted for this issue.


:rescue_worker_helmet:Automatic Remediation will be attempted for this issue.