Safety vulnerability ID: 39253
The information on this page was manually curated by our Cybersecurity Intelligence Team.
Py 1.10.0 includes a fix for CVE-2020-29651: A denial of service via regular expression in the py.path.svnwc component of py (aka python-py) through 1.9.0 could be used by attackers to cause a compute-time denial of service attack by supplying malicious input to the blame functionality.
Latest version: 1.11.0
library with cross-python path, ini-parsing, io, code, log facilities
A denial of service via regular expression in the py.path.svnwc component of py (aka python-py) through 1.9.0 could be used by attackers to cause a compute-time denial of service attack by supplying malicious input to the blame functionality. See CVE-2020-29651.
MISC:https://github.com/pytest-dev/py/issues/256: https://github.com/pytest-dev/py/issues/256
MISC:https://github.com/pytest-dev/py/pull/257: https://github.com/pytest-dev/py/pull/257
MISC:https://github.com/pytest-dev/py/pull/257/commits/4a9017dc6199d2a564b6e4b0aa39d6d8870e4144: https://github.com/pytest-dev/py/pull/257/commits/4a9017dc6199d2a564b6e4b0aa39d6d8870e4144
Scan your Python project for dependency vulnerabilities in two minutes
Scan your application