CVE-2020-29651: py vulnerable to Regular Expression Denial of Service
(updated )
A denial of service via regular expression in the py.path.svnwc component of py (aka python-py) through 1.9.0 could be used by attackers to cause a compute-time denial of service attack by supplying malicious input to the blame functionality.
References
- github.com/advisories/GHSA-hj5v-574p-mj7c
- github.com/pypa/advisory-database/tree/main/vulns/py/PYSEC-2020-92.yaml
- github.com/pytest-dev/py
- github.com/pytest-dev/py/issues/256
- github.com/pytest-dev/py/pull/257
- github.com/pytest-dev/py/pull/257/commits/4a9017dc6199d2a564b6e4b0aa39d6d8870e4144
- lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AYWNYEV3FGDHPIHX4DDUDMFZ6NLCQRC4
- lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CHDTINIBJZ67T3W74QTBIY5LPKAXEOGR
- nvd.nist.gov/vuln/detail/CVE-2020-29651
- www.oracle.com/security-alerts/cpujul2022.html
Detect and mitigate CVE-2020-29651 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →