DEVELOPING: Security Researchers Navigate the Maze of Getting Heard
BREAKING: The security reporting drama continues to unfold in the hallowed halls of protocolbuffers/protobuf, and folks, it's giving me serious bureaucratic thriller vibes.
Our first witness, @rahulhoysala, stepped forward in issue #26398 with what can only be described as a cry for help: "I have identified a vulnerability... but I am unsure where to contact a maintainer." The poor soul has already submitted through Google's VRP but found themselves trapped in the classic "we'll get back to you" limbo. Enter @zhangskz as the helpful guide, directing them back to VRP channels while promising internal coordination. Will our hero find their contact? Stay tuned.
But wait—there's more! In a plot twist worthy of daytime television, @VenkatKwest burst onto the scene with issue #26437, practically shouting "IMPORTANT NOTE: SUBMITTED THIS ISSUE TO THE GOOGLE VRP TEAM FEW DAYS BACK." This recursion depth vulnerability reads like a technical thriller, with MessageSet decoding paths and 200-level depth bypasses. @esrauchg swooped in with acknowledgment, noting that while the reset exists, it "can only happen 'once' in a given stack trace."
The real drama here? Two security researchers, two different approaches to the same bureaucratic maze. One seeks contact, the other got permission to go public. The proceedings continue...
