fix(deps): update dependency protobufjs to v7.5.5 [security]#8071
fix(deps): update dependency protobufjs to v7.5.5 [security]#8071renovate-bot wants to merge 1 commit intogoogleapis:mainfrom
Conversation
|
/gcbrun |
There was a problem hiding this comment.
Code Review
This pull request updates the protobufjs dependency to version 7.5.5 across multiple packages to address a security vulnerability. Feedback includes correcting an invalid semver range in handwritten/bigquery-storage/package.json, addressing a remaining nested vulnerable version of protobufjs in the package-lock.json, and investigating a suspicious version update for @types/node in the yarn.lock file.
954a9f9 to
7488e27
Compare
|
/gcbrun |
7488e27 to
1efed92
Compare
|
/gcbrun |
1efed92 to
46bb50d
Compare
|
/gcbrun |
46bb50d to
c135694
Compare
|
/gcbrun |
c135694 to
9dca9b2
Compare
|
/gcbrun |
|
any updates on this? our code sec agent is screaming for this vuln, asap release would be appreciated |
9dca9b2 to
1bc5f9f
Compare
|
/gcbrun |
1bc5f9f to
baa5e57
Compare
|
/gcbrun |
baa5e57 to
8f69140
Compare
|
/gcbrun |
It's a bit tricky because the |
8f69140 to
fc749c2
Compare
|
/gcbrun |
fc749c2 to
b70760b
Compare
|
/gcbrun |
I see. Thanks for clarification. Good luck and best efforts fixing this! |
cbe13ca to
7fb767f
Compare
|
/gcbrun |
7fb767f to
5edca7d
Compare
|
/gcbrun |
5edca7d to
a1e6628
Compare
|
/gcbrun |
a1e6628 to
5de5b93
Compare
|
/gcbrun |
2 similar comments
|
/gcbrun |
|
/gcbrun |
2aea76e to
5786e44
Compare
|
/gcbrun |
5786e44 to
b1cd38e
Compare
|
/gcbrun |
b1cd38e to
3a61454
Compare
|
/gcbrun |
3a61454 to
4f5198d
Compare
|
/gcbrun |
4f5198d to
d20325a
Compare
|
/gcbrun |
d20325a to
17519e8
Compare
|
/gcbrun |
17519e8 to
1222259
Compare
|
/gcbrun |
1222259 to
2768f9d
Compare
|
/gcbrun |
2768f9d to
0596d35
Compare
|
/gcbrun |
This PR contains the following updates:
~7.4.0→~7.5.57.2.4 - 7.5.0→7.5.5 7.5.5Arbitrary code execution in protobufjs
CVE-2026-41242 / GHSA-xq3m-2v4x-88gg
More information
Details
Summary
protobufjs compiles protobuf definitions into JS functions. Attackers can manipulate these definitions to execute arbitrary JS code.
Details
Attackers can inject arbitrary code in the "type" fields of protobuf definitions, which will then execute during object decoding using that definition.
PoC
Impact
Remote code execution when attackers can control the protobuf definition files.
Severity
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:HReferences
This data is provided by the GitHub Advisory Database (CC-BY 4.0).
Release Notes
protobufjs/protobuf.js (protobufjs)
v7.5.5: v7.5.5Compare Source
v7.5.5
This release backports two reported security issues to 7.x branch.
__proto__in Message constructor (#2126)Full Changelog: protobufjs/protobuf.js@protobufjs-v7.5.4...protobufjs-v7.5.5
v7.5.4Compare Source
Bug Fixes
v7.5.3Compare Source
Bug Fixes
v7.5.2Compare Source
Bug Fixes
v7.5.1Compare Source
Bug Fixes
v7.5.0Compare Source
Features
Bug Fixes
Configuration
📅 Schedule: (UTC)
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about these updates again.
This PR was generated by Mend Renovate. View the repository job log.