A denial of service via regular expression in the py.path.svnwc component of py (aka python-py) through 1.9.0 could be used by attackers to cause a compute-time denial of service attack by supplying malicious input to the blame functionality.
References
Link | Resource |
---|---|
https://github.com/pytest-dev/py/pull/257/commits/4a9017dc6199d2a564b6e4b0aa39d6d8870e4144 | Patch Third Party Advisory |
https://github.com/pytest-dev/py/issues/256 | Third Party Advisory |
https://github.com/pytest-dev/py/pull/257 | Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AYWNYEV3FGDHPIHX4DDUDMFZ6NLCQRC4/ | Mailing List Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CHDTINIBJZ67T3W74QTBIY5LPKAXEOGR/ | Mailing List Third Party Advisory |
https://www.oracle.com/security-alerts/cpujul2022.html | Third Party Advisory |
Information
Published : 2020-12-08 23:15
Updated : 2022-10-12 10:08
NVD link : CVE-2020-29651
Mitre link : CVE-2020-29651
JSON object : View
CWE
Products Affected
pytest
- py
oracle
- zfs_storage_appliance_kit
fedoraproject
- fedora