{"id":"AZL-76602","summary":"CVE-2026-0994 affecting package pytorch for versions less than 2.2.2-12","details":"A denial-of-service (DoS) vulnerability exists in google.protobuf.json_format.ParseDict() in Python, where the max_recursion_depth limit can be bypassed when parsing nested google.protobuf.Any messages.\n\nDue to missing recursion depth accounting inside the internal Any-handling logic, an attacker can supply deeply nested Any structures that bypass the intended recursion limit, eventually exhausting Python’s recursion stack and causing a RecursionError.","modified":"2026-04-01T05:22:57.742999Z","published":"2026-01-23T15:16:06Z","upstream":["CVE-2026-0994"],"references":[{"type":"WEB","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-0994"}],"affected":[{"package":{"name":"pytorch","ecosystem":"Azure Linux:3","purl":"pkg:rpm/azure-linux/pytorch"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.2.2-12"}]}],"database_specific":{"source":"https://github.com/microsoft/AzureLinuxVulnerabilityData/blob/main/osv/AZL-76602.json"}}],"schema_version":"1.7.5"}