Skip to content

Commit f8bd202

Browse files
1 parent 942231a commit f8bd202

3 files changed

Lines changed: 135 additions & 6 deletions

File tree

advisories/unreviewed/2026/01/GHSA-7gcm-g887-7qv7/GHSA-7gcm-g887-7qv7.json renamed to advisories/github-reviewed/2026/01/GHSA-7gcm-g887-7qv7/GHSA-7gcm-g887-7qv7.json

Lines changed: 34 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,36 +1,65 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-7gcm-g887-7qv7",
4-
"modified": "2026-01-23T15:31:35Z",
4+
"modified": "2026-01-23T16:56:33Z",
55
"published": "2026-01-23T15:31:35Z",
66
"aliases": [
77
"CVE-2026-0994"
88
],
9+
"summary": "protobuf affected by a JSON recursion depth bypass",
910
"details": "A denial-of-service (DoS) vulnerability exists in google.protobuf.json_format.ParseDict() in Python, where the max_recursion_depth limit can be bypassed when parsing nested google.protobuf.Any messages.\n\nDue to missing recursion depth accounting inside the internal Any-handling logic, an attacker can supply deeply nested Any structures that bypass the intended recursion limit, eventually exhausting Python’s recursion stack and causing a RecursionError.",
1011
"severity": [
1112
{
1213
"type": "CVSS_V4",
13-
"score": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"
14+
"score": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L"
15+
}
16+
],
17+
"affected": [
18+
{
19+
"package": {
20+
"ecosystem": "PyPI",
21+
"name": "protobuf"
22+
},
23+
"ranges": [
24+
{
25+
"type": "ECOSYSTEM",
26+
"events": [
27+
{
28+
"introduced": "0"
29+
},
30+
{
31+
"last_affected": "6.33.4"
32+
}
33+
]
34+
}
35+
]
1436
}
1537
],
16-
"affected": [],
1738
"references": [
1839
{
1940
"type": "ADVISORY",
2041
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-0994"
2142
},
43+
{
44+
"type": "WEB",
45+
"url": "https://github.com/protocolbuffers/protobuf/issues/25070"
46+
},
2247
{
2348
"type": "WEB",
2449
"url": "https://github.com/protocolbuffers/protobuf/pull/25239"
50+
},
51+
{
52+
"type": "PACKAGE",
53+
"url": "https://github.com/protocolbuffers/protobuf"
2554
}
2655
],
2756
"database_specific": {
2857
"cwe_ids": [
2958
"CWE-674"
3059
],
3160
"severity": "HIGH",
32-
"github_reviewed": false,
33-
"github_reviewed_at": null,
61+
"github_reviewed": true,
62+
"github_reviewed_at": "2026-01-23T16:56:33Z",
3463
"nvd_published_at": "2026-01-23T15:16:06Z"
3564
}
3665
}
Lines changed: 92 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,92 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-c32p-wcqj-j677",
4+
"modified": "2026-01-23T16:56:23Z",
5+
"published": "2026-01-23T16:56:23Z",
6+
"aliases": [],
7+
"summary": "CometBFT has inconsistencies between how commit signatures are verified and how block time is derived",
8+
"details": "# CSA-2026-001: Tachyon\n\n## Description\n\n**Name:** CSA-2026-001: Tachyon\n\n**Criticality:** Critical (Catastrophic Impact; Possible Likelihood per [ACMv1.2](https://github.com/interchainio/security/blob/main/resources/CLASSIFICATION_MATRIX.md))\n\n**Affected versions:** All versions of CometBFT\n\n**Affected users:** Validators and protocols relying on block timestamps\n\n## Description\n\nA consensus-level vulnerability was discovered in CometBFT's \"BFT Time\" implementation due to an inconsistency between how commit signatures are verified and how block time is derived.\n\nThis breaks a core BFT Time guarantee: \"A faulty process cannot arbitrarily increase the Time value.\"\n\n## Impact\n\nDownstream impact on chains affects any module, smart contract, or system that relies on the block timestamp.\n\n## Patches\n\nThe new CometBFT releases [v0.38.21](https://github.com/cometbft/cometbft/releases/tag/v0.38.21) and [v0.37.18](https://github.com/cometbft/cometbft/releases/tag/v0.37.18) fix this issue. The `main` unreleased branch is also patched.\n\n## Workarounds\n\nThere are no effective workarounds for this vulnerability. Upgrading to patched versions is required.\n\n## Timeline\n\n- January 8, 2026, 5:27PM UTC: Issue reported to Cosmos Bug Bounty Program\n- January 9, 2026, 4:55AM UTC: Issue triaged and validated by core team\n- January 12, 2026, 10:25PM UTC: Core team completes patch for the issue\n- January 13, 2026 4:41PM UTC: Pre-notification delivered to ecosystem partners\n- January 23, 2026, 3:00PM UTC: Patch made available\n\n## Credits\n\nThis issue was reported to the Cosmos Bug Bounty Program on HackerOne. Credit to SEAL 911 and [QED Audit](https://x.com/QED_Audit) for the discovery and help with the patch.\n\nIf you believe you have found a bug in the Cosmos Stack or would like to contribute to the program by reporting a bug, please see https://hackerone.com/cosmos.\n\nIf you have questions about Cosmos security efforts, please reach out to our official communication channel at security@cosmoslabs.io.\n\nA Github Security Advisory for this issue is available in the CometBFT repository. For more information about CometBFT, see https://docs.cometbft.com/.",
9+
"severity": [
10+
{
11+
"type": "CVSS_V4",
12+
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N"
13+
}
14+
],
15+
"affected": [
16+
{
17+
"package": {
18+
"ecosystem": "Go",
19+
"name": "github.com/cometbft/cometbft"
20+
},
21+
"ranges": [
22+
{
23+
"type": "ECOSYSTEM",
24+
"events": [
25+
{
26+
"introduced": "0.38.0-alpha.1"
27+
},
28+
{
29+
"fixed": "0.38.21"
30+
}
31+
]
32+
}
33+
],
34+
"database_specific": {
35+
"last_known_affected_version_range": "<= 0.38.20"
36+
}
37+
},
38+
{
39+
"package": {
40+
"ecosystem": "Go",
41+
"name": "github.com/cometbft/cometbft"
42+
},
43+
"ranges": [
44+
{
45+
"type": "ECOSYSTEM",
46+
"events": [
47+
{
48+
"introduced": "0"
49+
},
50+
{
51+
"fixed": "0.37.18"
52+
}
53+
]
54+
}
55+
],
56+
"database_specific": {
57+
"last_known_affected_version_range": "<= 0.37.17"
58+
}
59+
}
60+
],
61+
"references": [
62+
{
63+
"type": "WEB",
64+
"url": "https://github.com/cometbft/cometbft/security/advisories/GHSA-c32p-wcqj-j677"
65+
},
66+
{
67+
"type": "WEB",
68+
"url": "https://github.com/cometbft/cometbft/commit/bf8274fcdbcab2bc652660ae627196a90a6efb97"
69+
},
70+
{
71+
"type": "PACKAGE",
72+
"url": "https://github.com/cometbft/cometbft"
73+
},
74+
{
75+
"type": "WEB",
76+
"url": "https://github.com/cometbft/cometbft/releases/tag/v0.37.18"
77+
},
78+
{
79+
"type": "WEB",
80+
"url": "https://github.com/cometbft/cometbft/releases/tag/v0.38.21"
81+
}
82+
],
83+
"database_specific": {
84+
"cwe_ids": [
85+
"CWE-703"
86+
],
87+
"severity": "HIGH",
88+
"github_reviewed": true,
89+
"github_reviewed_at": "2026-01-23T16:56:23Z",
90+
"nvd_published_at": null
91+
}
92+
}

advisories/github-reviewed/2026/01/GHSA-hx9q-6w63-j58v/GHSA-hx9q-6w63-j58v.json

Lines changed: 9 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-hx9q-6w63-j58v",
4-
"modified": "2026-01-22T18:55:43Z",
4+
"modified": "2026-01-23T16:56:03Z",
55
"published": "2026-01-22T18:30:33Z",
66
"aliases": [
77
"CVE-2025-67221"
@@ -40,6 +40,14 @@
4040
"type": "ADVISORY",
4141
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-67221"
4242
},
43+
{
44+
"type": "WEB",
45+
"url": "https://github.com/ijl/orjson/issues/620"
46+
},
47+
{
48+
"type": "WEB",
49+
"url": "https://github.com/kpatsakis/CVE-2025-67221/issues/1"
50+
},
4351
{
4452
"type": "PACKAGE",
4553
"url": "https://github.com/ijl/orjson"

0 commit comments

Comments
 (0)