A denial of service via regular expression in the py.path.svnwc component of py (aka python-py) through 1.9.0 could be used by attackers to cause a compute-time denial of service attack by supplying malicious input to the blame functionality.
{ "ubuntu_priority": "medium", "availability": "No subscription required", "binaries": [ { "binary_name": "pypy-py", "binary_version": "1.5.2-1ubuntu0.1" }, { "binary_name": "python-py", "binary_version": "1.5.2-1ubuntu0.1" }, { "binary_name": "python3-py", "binary_version": "1.5.2-1ubuntu0.1" } ] }
{ "ubuntu_priority": "medium", "availability": "No subscription required", "binaries": [ { "binary_name": "pypy-py", "binary_version": "1.8.1-1ubuntu0.1" }, { "binary_name": "python-py", "binary_version": "1.8.1-1ubuntu0.1" }, { "binary_name": "python3-py", "binary_version": "1.8.1-1ubuntu0.1" } ] }