{"id":"AZL-76487","summary":"CVE-2026-0994 affecting package protobuf for versions less than 3.17.3-5","details":"A denial-of-service (DoS) vulnerability exists in google.protobuf.json_format.ParseDict() in Python, where the max_recursion_depth limit can be bypassed when parsing nested google.protobuf.Any messages.\n\nDue to missing recursion depth accounting inside the internal Any-handling logic, an attacker can supply deeply nested Any structures that bypass the intended recursion limit, eventually exhausting Python’s recursion stack and causing a RecursionError.","modified":"2026-04-01T05:22:57.826351Z","published":"2026-01-23T15:16:06Z","upstream":["CVE-2026-0994"],"references":[{"type":"WEB","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-0994"}],"affected":[{"package":{"name":"protobuf","ecosystem":"Azure Linux:2","purl":"pkg:rpm/azure-linux/protobuf"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3.17.3-5"}]}],"database_specific":{"source":"https://github.com/microsoft/AzureLinuxVulnerabilityData/blob/main/osv/AZL-76487.json"}}],"schema_version":"1.7.5"}