CVE-2026-30922

pyasn1 is a generic ASN.1 library for Python. Prior to 0.6.3, the `pyasn1` library is vulnerable to a Denial of Service (DoS) attack caused by uncontrolled recursion when decoding ASN.1 data with deeply nested structures. An attacker can supply a crafted payload containing thousands of nested `SEQUENCE` (`0x30`) or `SET` (`0x31`) tags with "Indefinite Length" (`0x80`) markers. This forces the decoder to recursively call itself until the Python interpreter crashes with a `RecursionError` or consumes all available memory (OOM), crashing the host application. This is a distinct vulnerability from CVE-2026-23490 (which addressed integer overflows in OID decoding). The fix for CVE-2026-23490 (`MAX_OID_ARC_CONTINUATION_OCTETS`) does not mitigate this recursion issue. Version 0.6.3 fixes this specific issue.
Configurations

Configuration 1 (hide)

cpe:2.3:a:pyasn1:pyasn1:*:*:*:*:*:python:*:*

History

21 Mar 2026, 01:17

Type Values Removed Values Added
References
  • () http://www.openwall.com/lists/oss-security/2026/03/20/4 -

20 Mar 2026, 17:48

Type Values Removed Values Added
First Time Pyasn1
Pyasn1 pyasn1
CPE cpe:2.3:a:pyasn1:pyasn1:*:*:*:*:*:python:*:*
References () https://github.com/pyasn1/pyasn1/commit/25ad481c19fdb006e20485ef3fc2e5b3eff30ef0 - () https://github.com/pyasn1/pyasn1/commit/25ad481c19fdb006e20485ef3fc2e5b3eff30ef0 - Patch
References () https://github.com/pyasn1/pyasn1/security/advisories/GHSA-jr27-m4p2-rc6r - () https://github.com/pyasn1/pyasn1/security/advisories/GHSA-jr27-m4p2-rc6r - Exploit, Vendor Advisory

18 Mar 2026, 14:52

Type Values Removed Values Added
Summary
  • (es) pyasn1 es una biblioteca ASN.1 genérica para Python. Antes de la versión 0.6.3, la biblioteca 'pyasn1' es vulnerable a un ataque de denegación de servicio (DoS) causado por recursión incontrolada al decodificar datos ASN.1 con estructuras profundamente anidadas. Un atacante puede suministrar una carga útil manipulada que contenga miles de etiquetas 'SEQUENCE' ('0x30') o 'SET' ('0x31') anidadas con marcadores de 'Longitud Indefinida' ('0x80'). Esto fuerza al decodificador a llamarse recursivamente hasta que el intérprete de Python falla con un 'RecursionError' o consume toda la memoria disponible (OOM), provocando la caída de la aplicación anfitriona. Esta es una vulnerabilidad distinta de CVE-2026-23490 (que abordó desbordamientos de enteros en la decodificación de OID). La solución para CVE-2026-23490 ('MAX_OID_ARC_CONTINUATION_OCTETS') no mitiga este problema de recursión. La versión 0.6.3 soluciona este problema específico.

18 Mar 2026, 04:17

Type Values Removed Values Added
New CVE

Information

Published : 2026-03-18 04:17

Updated : 2026-03-21 01:17


NVD link : CVE-2026-30922

Mitre link : CVE-2026-30922

CVE.ORG link : CVE-2026-30922


JSON object : View

Products Affected

pyasn1

  • pyasn1
CWE
CWE-674

Uncontrolled Recursion