A denial of service via regular expression in the py.path.svnwc component of py (aka python-py) through 1.9.0 could be used by attackers to cause a compute-time denial of service attack by supplying malicious input to the blame functionality.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-3966-1 | pypy3 security update |
EUVD |
EUVD-2020-0152 | A denial of service via regular expression in the py.path.svnwc component of py (aka python-py) through 1.9.0 could be used by attackers to cause a compute-time denial of service attack by supplying malicious input to the blame functionality. |
Github GHSA |
GHSA-hj5v-574p-mj7c | py vulnerable to Regular Expression Denial of Service |
Ubuntu USN |
USN-5138-1 | python-py vulnerability |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Mon, 03 Nov 2025 22:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Mon, 14 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-11-03T21:44:20.561Z
Reserved: 2020-12-09T00:00:00.000Z
Link: CVE-2020-29651
No data.
Status : Modified
Published: 2020-12-09T07:15:12.533
Modified: 2025-11-03T22:15:46.663
Link: CVE-2020-29651
OpenCVE Enrichment
No data.
Debian DLA
EUVD
Github GHSA
Ubuntu USN