Skip to content
This repository was archived by the owner on Aug 15, 2025. It is now read-only.

Conversation

@renovate
Copy link

@renovate renovate bot commented Aug 6, 2024

This PR contains the following updates:

Package Change Age Confidence
google.golang.org/protobuf v1.32.0 -> v1.33.0 age confidence

GitHub Vulnerability Alerts

CVE-2024-24786

The protojson.Unmarshal function can enter an infinite loop when unmarshaling certain forms of invalid JSON. This condition can occur when unmarshaling into a message which contains a google.protobuf.Any value, or when the UnmarshalOptions.DiscardUnknown option is set.


Release Notes

protocolbuffers/protobuf-go (google.golang.org/protobuf)

v1.33.0

Compare Source

This release contains one security fix:

  • encoding/protojson: Unmarshal could enter an infinite loop when unmarshaling certain forms of invalid JSON. This condition can occur when unmarshaling into a message which contains a google.protobuf.Any value, or when the UnmarshalOptions.DiscardUnknown option is set. Unmarshal now correctly returns an error when handling these inputs. This is CVE-2024-24786.

@renovate renovate bot changed the title fix(deps): update module google.golang.org/protobuf to v1.33.0 [security] fix(deps): update module google.golang.org/protobuf to v1.33.0 [security] - autoclosed Apr 16, 2025
@renovate renovate bot closed this Apr 16, 2025
@renovate renovate bot deleted the renovate/go-google.golang.org-protobuf-vulnerability branch April 16, 2025 02:23
@renovate renovate bot changed the title fix(deps): update module google.golang.org/protobuf to v1.33.0 [security] - autoclosed fix(deps): update module google.golang.org/protobuf to v1.33.0 [security] Apr 16, 2025
@renovate renovate bot reopened this Apr 16, 2025
@renovate renovate bot force-pushed the renovate/go-google.golang.org-protobuf-vulnerability branch from e2697dd to ceb56f6 Compare April 16, 2025 07:13
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant