Package | Installed | Affected | Info |
---|---|---|---|
protobuf | 3.17.3 | <3.18.3 , >=3.19.0rc0,<3.19.5 , >=3.20.0rc0,<3.20.2 , >=4.0.0rc0,<4.21.6 |
show Protobuf 3.18.3, 3.19.5, 3.20.2 and 4.21.6 include a fix for CVE-2022-1941: A parsing vulnerability for the MessageSet type in the ProtocolBuffers versions prior to and including 3.16.1, 3.17.3, 3.18.2, 3.19.4, 3.20.1 and 3.21.5 for protobuf-cpp, and versions prior to and including 3.16.1, 3.17.3, 3.18.2, 3.19.4, 3.20.1 and 4.21.5 for protobuf-python can lead to out of memory failures. A specially crafted message with multiple key-value per elements creates parsing issues, and can lead to a Denial of Service against services receiving unsanitized input. https://github.com/protocolbuffers/protobuf/security/advisories/GHSA-8gq9-2x98-w8hf |
protobuf | 3.17.3 | <4.25.8 , >=5.26.0rc1,<5.29.5 , >=6.30.0rc1,<6.31.1 |
show Affected versions of this package are vulnerable to a potential Denial of Service (DoS) attack due to unbounded recursion when parsing untrusted Protocol Buffers data. The pure-Python implementation fails to enforce recursion depth limits when processing recursive groups, recursive messages, or a series of SGROUP tags, leading to stack overflow conditions that can crash the application by exceeding Python's recursion limit. |
Package | Installed | Affected | Info |
---|---|---|---|
protobuf | 3.17.3 | <3.18.3 , >=3.19.0rc0,<3.19.5 , >=3.20.0rc0,<3.20.2 , >=4.0.0rc0,<4.21.6 |
show Protobuf 3.18.3, 3.19.5, 3.20.2 and 4.21.6 include a fix for CVE-2022-1941: A parsing vulnerability for the MessageSet type in the ProtocolBuffers versions prior to and including 3.16.1, 3.17.3, 3.18.2, 3.19.4, 3.20.1 and 3.21.5 for protobuf-cpp, and versions prior to and including 3.16.1, 3.17.3, 3.18.2, 3.19.4, 3.20.1 and 4.21.5 for protobuf-python can lead to out of memory failures. A specially crafted message with multiple key-value per elements creates parsing issues, and can lead to a Denial of Service against services receiving unsanitized input. https://github.com/protocolbuffers/protobuf/security/advisories/GHSA-8gq9-2x98-w8hf |
protobuf | 3.17.3 | <4.25.8 , >=5.26.0rc1,<5.29.5 , >=6.30.0rc1,<6.31.1 |
show Affected versions of this package are vulnerable to a potential Denial of Service (DoS) attack due to unbounded recursion when parsing untrusted Protocol Buffers data. The pure-Python implementation fails to enforce recursion depth limits when processing recursive groups, recursive messages, or a series of SGROUP tags, leading to stack overflow conditions that can crash the application by exceeding Python's recursion limit. |
Package | Installed | Affected | Info |
---|---|---|---|
protobuf | 3.17.3 | <3.18.3 , >=3.19.0rc0,<3.19.5 , >=3.20.0rc0,<3.20.2 , >=4.0.0rc0,<4.21.6 |
show Protobuf 3.18.3, 3.19.5, 3.20.2 and 4.21.6 include a fix for CVE-2022-1941: A parsing vulnerability for the MessageSet type in the ProtocolBuffers versions prior to and including 3.16.1, 3.17.3, 3.18.2, 3.19.4, 3.20.1 and 3.21.5 for protobuf-cpp, and versions prior to and including 3.16.1, 3.17.3, 3.18.2, 3.19.4, 3.20.1 and 4.21.5 for protobuf-python can lead to out of memory failures. A specially crafted message with multiple key-value per elements creates parsing issues, and can lead to a Denial of Service against services receiving unsanitized input. https://github.com/protocolbuffers/protobuf/security/advisories/GHSA-8gq9-2x98-w8hf |
protobuf | 3.17.3 | <4.25.8 , >=5.26.0rc1,<5.29.5 , >=6.30.0rc1,<6.31.1 |
show Affected versions of this package are vulnerable to a potential Denial of Service (DoS) attack due to unbounded recursion when parsing untrusted Protocol Buffers data. The pure-Python implementation fails to enforce recursion depth limits when processing recursive groups, recursive messages, or a series of SGROUP tags, leading to stack overflow conditions that can crash the application by exceeding Python's recursion limit. |
Package | Installed | Affected | Info |
---|---|---|---|
protobuf | 3.17.3 | <3.18.3 , >=3.19.0rc0,<3.19.5 , >=3.20.0rc0,<3.20.2 , >=4.0.0rc0,<4.21.6 |
show Protobuf 3.18.3, 3.19.5, 3.20.2 and 4.21.6 include a fix for CVE-2022-1941: A parsing vulnerability for the MessageSet type in the ProtocolBuffers versions prior to and including 3.16.1, 3.17.3, 3.18.2, 3.19.4, 3.20.1 and 3.21.5 for protobuf-cpp, and versions prior to and including 3.16.1, 3.17.3, 3.18.2, 3.19.4, 3.20.1 and 4.21.5 for protobuf-python can lead to out of memory failures. A specially crafted message with multiple key-value per elements creates parsing issues, and can lead to a Denial of Service against services receiving unsanitized input. https://github.com/protocolbuffers/protobuf/security/advisories/GHSA-8gq9-2x98-w8hf |
protobuf | 3.17.3 | <4.25.8 , >=5.26.0rc1,<5.29.5 , >=6.30.0rc1,<6.31.1 |
show Affected versions of this package are vulnerable to a potential Denial of Service (DoS) attack due to unbounded recursion when parsing untrusted Protocol Buffers data. The pure-Python implementation fails to enforce recursion depth limits when processing recursive groups, recursive messages, or a series of SGROUP tags, leading to stack overflow conditions that can crash the application by exceeding Python's recursion limit. |
Package | Installed | Affected | Info |
---|---|---|---|
protobuf | 3.17.3 | <3.18.3 , >=3.19.0rc0,<3.19.5 , >=3.20.0rc0,<3.20.2 , >=4.0.0rc0,<4.21.6 |
show Protobuf 3.18.3, 3.19.5, 3.20.2 and 4.21.6 include a fix for CVE-2022-1941: A parsing vulnerability for the MessageSet type in the ProtocolBuffers versions prior to and including 3.16.1, 3.17.3, 3.18.2, 3.19.4, 3.20.1 and 3.21.5 for protobuf-cpp, and versions prior to and including 3.16.1, 3.17.3, 3.18.2, 3.19.4, 3.20.1 and 4.21.5 for protobuf-python can lead to out of memory failures. A specially crafted message with multiple key-value per elements creates parsing issues, and can lead to a Denial of Service against services receiving unsanitized input. https://github.com/protocolbuffers/protobuf/security/advisories/GHSA-8gq9-2x98-w8hf |
protobuf | 3.17.3 | <4.25.8 , >=5.26.0rc1,<5.29.5 , >=6.30.0rc1,<6.31.1 |
show Affected versions of this package are vulnerable to a potential Denial of Service (DoS) attack due to unbounded recursion when parsing untrusted Protocol Buffers data. The pure-Python implementation fails to enforce recursion depth limits when processing recursive groups, recursive messages, or a series of SGROUP tags, leading to stack overflow conditions that can crash the application by exceeding Python's recursion limit. |
Package | Installed | Affected | Info |
---|---|---|---|
protobuf | 3.17.3 | <3.18.3 , >=3.19.0rc0,<3.19.5 , >=3.20.0rc0,<3.20.2 , >=4.0.0rc0,<4.21.6 |
show Protobuf 3.18.3, 3.19.5, 3.20.2 and 4.21.6 include a fix for CVE-2022-1941: A parsing vulnerability for the MessageSet type in the ProtocolBuffers versions prior to and including 3.16.1, 3.17.3, 3.18.2, 3.19.4, 3.20.1 and 3.21.5 for protobuf-cpp, and versions prior to and including 3.16.1, 3.17.3, 3.18.2, 3.19.4, 3.20.1 and 4.21.5 for protobuf-python can lead to out of memory failures. A specially crafted message with multiple key-value per elements creates parsing issues, and can lead to a Denial of Service against services receiving unsanitized input. https://github.com/protocolbuffers/protobuf/security/advisories/GHSA-8gq9-2x98-w8hf |
protobuf | 3.17.3 | <4.25.8 , >=5.26.0rc1,<5.29.5 , >=6.30.0rc1,<6.31.1 |
show Affected versions of this package are vulnerable to a potential Denial of Service (DoS) attack due to unbounded recursion when parsing untrusted Protocol Buffers data. The pure-Python implementation fails to enforce recursion depth limits when processing recursive groups, recursive messages, or a series of SGROUP tags, leading to stack overflow conditions that can crash the application by exceeding Python's recursion limit. |
Package | Installed | Affected | Info |
---|---|---|---|
protobuf | 3.17.3 | <3.18.3 , >=3.19.0rc0,<3.19.5 , >=3.20.0rc0,<3.20.2 , >=4.0.0rc0,<4.21.6 |
show Protobuf 3.18.3, 3.19.5, 3.20.2 and 4.21.6 include a fix for CVE-2022-1941: A parsing vulnerability for the MessageSet type in the ProtocolBuffers versions prior to and including 3.16.1, 3.17.3, 3.18.2, 3.19.4, 3.20.1 and 3.21.5 for protobuf-cpp, and versions prior to and including 3.16.1, 3.17.3, 3.18.2, 3.19.4, 3.20.1 and 4.21.5 for protobuf-python can lead to out of memory failures. A specially crafted message with multiple key-value per elements creates parsing issues, and can lead to a Denial of Service against services receiving unsanitized input. https://github.com/protocolbuffers/protobuf/security/advisories/GHSA-8gq9-2x98-w8hf |
protobuf | 3.17.3 | <4.25.8 , >=5.26.0rc1,<5.29.5 , >=6.30.0rc1,<6.31.1 |
show Affected versions of this package are vulnerable to a potential Denial of Service (DoS) attack due to unbounded recursion when parsing untrusted Protocol Buffers data. The pure-Python implementation fails to enforce recursion depth limits when processing recursive groups, recursive messages, or a series of SGROUP tags, leading to stack overflow conditions that can crash the application by exceeding Python's recursion limit. |
Package | Installed | Affected | Info |
---|---|---|---|
protobuf | 3.17.3 | <3.18.3 , >=3.19.0rc0,<3.19.5 , >=3.20.0rc0,<3.20.2 , >=4.0.0rc0,<4.21.6 |
show Protobuf 3.18.3, 3.19.5, 3.20.2 and 4.21.6 include a fix for CVE-2022-1941: A parsing vulnerability for the MessageSet type in the ProtocolBuffers versions prior to and including 3.16.1, 3.17.3, 3.18.2, 3.19.4, 3.20.1 and 3.21.5 for protobuf-cpp, and versions prior to and including 3.16.1, 3.17.3, 3.18.2, 3.19.4, 3.20.1 and 4.21.5 for protobuf-python can lead to out of memory failures. A specially crafted message with multiple key-value per elements creates parsing issues, and can lead to a Denial of Service against services receiving unsanitized input. https://github.com/protocolbuffers/protobuf/security/advisories/GHSA-8gq9-2x98-w8hf |
protobuf | 3.17.3 | <4.25.8 , >=5.26.0rc1,<5.29.5 , >=6.30.0rc1,<6.31.1 |
show Affected versions of this package are vulnerable to a potential Denial of Service (DoS) attack due to unbounded recursion when parsing untrusted Protocol Buffers data. The pure-Python implementation fails to enforce recursion depth limits when processing recursive groups, recursive messages, or a series of SGROUP tags, leading to stack overflow conditions that can crash the application by exceeding Python's recursion limit. |
Package | Installed | Affected | Info |
---|---|---|---|
protobuf | 3.17.3 | <3.18.3 , >=3.19.0rc0,<3.19.5 , >=3.20.0rc0,<3.20.2 , >=4.0.0rc0,<4.21.6 |
show Protobuf 3.18.3, 3.19.5, 3.20.2 and 4.21.6 include a fix for CVE-2022-1941: A parsing vulnerability for the MessageSet type in the ProtocolBuffers versions prior to and including 3.16.1, 3.17.3, 3.18.2, 3.19.4, 3.20.1 and 3.21.5 for protobuf-cpp, and versions prior to and including 3.16.1, 3.17.3, 3.18.2, 3.19.4, 3.20.1 and 4.21.5 for protobuf-python can lead to out of memory failures. A specially crafted message with multiple key-value per elements creates parsing issues, and can lead to a Denial of Service against services receiving unsanitized input. https://github.com/protocolbuffers/protobuf/security/advisories/GHSA-8gq9-2x98-w8hf |
protobuf | 3.17.3 | <4.25.8 , >=5.26.0rc1,<5.29.5 , >=6.30.0rc1,<6.31.1 |
show Affected versions of this package are vulnerable to a potential Denial of Service (DoS) attack due to unbounded recursion when parsing untrusted Protocol Buffers data. The pure-Python implementation fails to enforce recursion depth limits when processing recursive groups, recursive messages, or a series of SGROUP tags, leading to stack overflow conditions that can crash the application by exceeding Python's recursion limit. |
Package | Installed | Affected | Info |
---|---|---|---|
protobuf | 3.17.3 | <3.18.3 , >=3.19.0rc0,<3.19.5 , >=3.20.0rc0,<3.20.2 , >=4.0.0rc0,<4.21.6 |
show Protobuf 3.18.3, 3.19.5, 3.20.2 and 4.21.6 include a fix for CVE-2022-1941: A parsing vulnerability for the MessageSet type in the ProtocolBuffers versions prior to and including 3.16.1, 3.17.3, 3.18.2, 3.19.4, 3.20.1 and 3.21.5 for protobuf-cpp, and versions prior to and including 3.16.1, 3.17.3, 3.18.2, 3.19.4, 3.20.1 and 4.21.5 for protobuf-python can lead to out of memory failures. A specially crafted message with multiple key-value per elements creates parsing issues, and can lead to a Denial of Service against services receiving unsanitized input. https://github.com/protocolbuffers/protobuf/security/advisories/GHSA-8gq9-2x98-w8hf |
protobuf | 3.17.3 | <4.25.8 , >=5.26.0rc1,<5.29.5 , >=6.30.0rc1,<6.31.1 |
show Affected versions of this package are vulnerable to a potential Denial of Service (DoS) attack due to unbounded recursion when parsing untrusted Protocol Buffers data. The pure-Python implementation fails to enforce recursion depth limits when processing recursive groups, recursive messages, or a series of SGROUP tags, leading to stack overflow conditions that can crash the application by exceeding Python's recursion limit. |
Package | Installed | Affected | Info |
---|---|---|---|
protobuf | 3.17.3 | <3.18.3 , >=3.19.0rc0,<3.19.5 , >=3.20.0rc0,<3.20.2 , >=4.0.0rc0,<4.21.6 |
show Protobuf 3.18.3, 3.19.5, 3.20.2 and 4.21.6 include a fix for CVE-2022-1941: A parsing vulnerability for the MessageSet type in the ProtocolBuffers versions prior to and including 3.16.1, 3.17.3, 3.18.2, 3.19.4, 3.20.1 and 3.21.5 for protobuf-cpp, and versions prior to and including 3.16.1, 3.17.3, 3.18.2, 3.19.4, 3.20.1 and 4.21.5 for protobuf-python can lead to out of memory failures. A specially crafted message with multiple key-value per elements creates parsing issues, and can lead to a Denial of Service against services receiving unsanitized input. https://github.com/protocolbuffers/protobuf/security/advisories/GHSA-8gq9-2x98-w8hf |
protobuf | 3.17.3 | <4.25.8 , >=5.26.0rc1,<5.29.5 , >=6.30.0rc1,<6.31.1 |
show Affected versions of this package are vulnerable to a potential Denial of Service (DoS) attack due to unbounded recursion when parsing untrusted Protocol Buffers data. The pure-Python implementation fails to enforce recursion depth limits when processing recursive groups, recursive messages, or a series of SGROUP tags, leading to stack overflow conditions that can crash the application by exceeding Python's recursion limit. |
Package | Installed | Affected | Info |
---|---|---|---|
protobuf | 3.17.3 | <3.18.3 , >=3.19.0rc0,<3.19.5 , >=3.20.0rc0,<3.20.2 , >=4.0.0rc0,<4.21.6 |
show Protobuf 3.18.3, 3.19.5, 3.20.2 and 4.21.6 include a fix for CVE-2022-1941: A parsing vulnerability for the MessageSet type in the ProtocolBuffers versions prior to and including 3.16.1, 3.17.3, 3.18.2, 3.19.4, 3.20.1 and 3.21.5 for protobuf-cpp, and versions prior to and including 3.16.1, 3.17.3, 3.18.2, 3.19.4, 3.20.1 and 4.21.5 for protobuf-python can lead to out of memory failures. A specially crafted message with multiple key-value per elements creates parsing issues, and can lead to a Denial of Service against services receiving unsanitized input. https://github.com/protocolbuffers/protobuf/security/advisories/GHSA-8gq9-2x98-w8hf |
protobuf | 3.17.3 | <4.25.8 , >=5.26.0rc1,<5.29.5 , >=6.30.0rc1,<6.31.1 |
show Affected versions of this package are vulnerable to a potential Denial of Service (DoS) attack due to unbounded recursion when parsing untrusted Protocol Buffers data. The pure-Python implementation fails to enforce recursion depth limits when processing recursive groups, recursive messages, or a series of SGROUP tags, leading to stack overflow conditions that can crash the application by exceeding Python's recursion limit. |
https://pyup.io/repos/github/jonaylor89/chronos/python-3-shield.svg
[](https://pyup.io/repos/github/jonaylor89/chronos/)
.. image:: https://pyup.io/repos/github/jonaylor89/chronos/python-3-shield.svg :target: https://pyup.io/repos/github/jonaylor89/chronos/ :alt: Python 3
<a href="https://pyup.io/repos/github/jonaylor89/chronos/"><img src="https://pyup.io/repos/github/jonaylor89/chronos/shield.svg" alt="Python 3" /></a>
!https://pyup.io/repos/github/jonaylor89/chronos/python-3-shield.svg(Python 3)!:https://pyup.io/repos/github/jonaylor89/chronos/
{<img src="https://pyup.io/repos/github/jonaylor89/chronos/python-3-shield.svg" alt="Python 3" />}[https://pyup.io/repos/github/jonaylor89/chronos/]
https://pyup.io/repos/github/jonaylor89/chronos/shield.svg
[](https://pyup.io/repos/github/jonaylor89/chronos/)
.. image:: https://pyup.io/repos/github/jonaylor89/chronos/shield.svg :target: https://pyup.io/repos/github/jonaylor89/chronos/ :alt: Updates
<a href="https://pyup.io/repos/github/jonaylor89/chronos/"><img src="https://pyup.io/repos/github/jonaylor89/chronos/shield.svg" alt="Updates" /></a>
!https://pyup.io/repos/github/jonaylor89/chronos/shield.svg(Updates)!:https://pyup.io/repos/github/jonaylor89/chronos/
{<img src="https://pyup.io/repos/github/jonaylor89/chronos/shield.svg" alt="Updates" />}[https://pyup.io/repos/github/jonaylor89/chronos/]