CVE-2022-42969

NameCVE-2022-42969
DescriptionThe py library through 1.11.0 for Python allows remote attackers to conduct a ReDoS (Regular expression Denial of Service) attack via a Subversion repository with crafted info data, because the InfoSvnCommand argument is mishandled. Note: This has been disputed by multiple third parties as not being reproduceable and they argue this is not a valid vulnerability.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
python-py (PTS)stretch1.4.32-3vulnerable
buster1.7.0-2vulnerable
bullseye1.10.0-1vulnerable
bookworm1.11.0-1vulnerable
sid, trixie1.11.0-2vulnerable

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
python-pysource(unstable)(unfixed)unimportant

Notes

https://github.com/pytest-dev/py/issues/287
Negligible security impact and disputed upstream
https://github.com/pytest-dev/py/issues/287#issuecomment-1283784766

Search for package or bug name: Reporting problems