Safety vulnerability ID: 41290
The information on this page was manually curated by our Cybersecurity Intelligence Team.
The rencode package through 1.0.6 for Python allows an infinite loop in typecode decoding (such as via ;\x2f\x7f), enabling a remote attack that consumes CPU and memory.
https://seclists.org/fulldisclosure/2021/Sep/16
Latest version: 1.0.6
Web safe object pickling/unpickling
The rencode package through 1.0.6 for Python allows an infinite loop in typecode decoding (such as via ;\x2f\x7f), enabling a remote attack that consumes CPU and memory. See CVE-2021-40839.
MISC:https://github.com/aresch/rencode/commit/572ff74586d9b1daab904c6f7f7009ce0143bb75: https://github.com/aresch/rencode/commit/572ff74586d9b1daab904c6f7f7009ce0143bb75
MISC:https://github.com/aresch/rencode/pull/29: https://github.com/aresch/rencode/pull/29
MISC:https://pypi.org/project/rencode/#history: https://pypi.org/project/rencode/#history
MISC:https://seclists.org/fulldisclosure/2021/Sep/16: https://seclists.org/fulldisclosure/2021/Sep/16
Scan your Python project for dependency vulnerabilities in two minutes
Scan your application