The rencode package through 1.0.6 for Python allows an infinite loop in typecode decoding (such as via ;\x2f\x7f), enabling a remote attack that consumes CPU and memory.
References
Link | Resource |
---|---|
https://github.com/aresch/rencode/pull/29 | Patch Third Party Advisory |
https://pypi.org/project/rencode/#history | Third Party Advisory |
https://seclists.org/fulldisclosure/2021/Sep/16 | Mailing List Third Party Advisory |
https://github.com/aresch/rencode/commit/572ff74586d9b1daab904c6f7f7009ce0143bb75 | Patch Third Party Advisory |
https://security.netapp.com/advisory/ntap-20211008-0001/ | Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BMVQRPDVSVZNGGX57CFKCYT3DEYO4QB6/ | Mailing List Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MCLETLGVM5DBX6QNHQFW6TWGO5T3DENY/ | Mailing List Third Party Advisory |
Information
Published : 2021-09-09 19:15
Updated : 2022-02-22 06:48
NVD link : CVE-2021-40839
Mitre link : CVE-2021-40839
JSON object : View
CWE
CWE-835
Loop with Unreachable Exit Condition ('Infinite Loop')
Products Affected
rencode_project
- rencode
fedoraproject
- fedora