Release date:
2026-03-04 11:20:08 UTC
Description:
- CVE-2026-0994: recursion depth bypass in json_format.ParseDict
Updated packages:
-
protobuf-3.14.0-16.el9.tuxcare.els2.i686.rpm
sha:5aa9f3d8939a841707e1965f074724bd9ee9238ba6ed944c815c2ef6624f3ae9
-
protobuf-3.14.0-16.el9.tuxcare.els2.x86_64.rpm
sha:b6739b49424f5bddbc6200dea34d8328f1d9f5879e6320a807794be601d98c09
-
protobuf-compiler-3.14.0-16.el9.tuxcare.els2.i686.rpm
sha:575466e08b2bf582b64c086e0e453f1e8afa8163e7ad521ffe5927fc16781c43
-
protobuf-compiler-3.14.0-16.el9.tuxcare.els2.x86_64.rpm
sha:9107b2e6d058b7abd0ee692c22e169b9aade85fcd984e1270395d7995e2913a1
-
protobuf-devel-3.14.0-16.el9.tuxcare.els2.i686.rpm
sha:a7a9312c58b89bad8911897165a41e4d0319872bd48c967429328b74fc4fc74c
-
protobuf-devel-3.14.0-16.el9.tuxcare.els2.x86_64.rpm
sha:73afeddbc0cca95aa1db77c3aecd2af8c8108d06119c1579df5574f540580a30
-
protobuf-emacs-3.14.0-16.el9.tuxcare.els2.noarch.rpm
sha:aa87e6b8e00640463e5c2db2699c97e606e606b5456ae664912b9430bc3edb6f
-
protobuf-lite-3.14.0-16.el9.tuxcare.els2.i686.rpm
sha:d04fe99fc16582b8eb9e20ce8ed54fb080c43080543d31da18caadee436333dd
-
protobuf-lite-3.14.0-16.el9.tuxcare.els2.x86_64.rpm
sha:c0aecf71dc2a47feb4226befb5d05f4d84fb4e5627148ee73123e7bcffba487e
-
protobuf-lite-devel-3.14.0-16.el9.tuxcare.els2.i686.rpm
sha:de6385bd683ca49ad1808f0865f1687a0b89d5535fc7cf9992968913e6eb77a0
-
protobuf-lite-devel-3.14.0-16.el9.tuxcare.els2.x86_64.rpm
sha:50c7a0a53b15d97eb0a50b6415aebbc667bf9bfb8183932c7863b4dd982e6e23
-
protobuf-lite-static-3.14.0-16.el9.tuxcare.els2.x86_64.rpm
sha:e6778d10e233683723a4af01c3aa764858e8a5822b8ef17cfed1ca386fb4754b
-
protobuf-static-3.14.0-16.el9.tuxcare.els2.x86_64.rpm
sha:49390e78444e4552a40135485e6a568a5979fb66364e88cb484420ba4ac83c80
-
protobuf-vim-3.14.0-16.el9.tuxcare.els2.noarch.rpm
sha:28348cdcf8b4d0d8f6b9c3e546c78bc703f0847ecfa46d964e63797b567b2952
-
python3-protobuf-3.14.0-16.el9.tuxcare.els2.noarch.rpm
sha:4ee3734da9a31ed4ecd108df162762febad7dc90ef91838c5fc0ede654fbe977
Notes:
This page is generated automatically and has not been checked for errors. For clarification or
corrections please contact the
CloudLinux Packaging Team.