USN-8129-1

Source
https://ubuntu.com/security/notices/USN-8129-1
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-8129-1.json
JSON Data
https://api.osv.dev/v1/vulns/USN-8129-1
Upstream
Related
Published
2026-03-30T11:41:01Z
Modified
2026-03-31T18:16:27.943967Z
Summary
pyasn1 vulnerability
Details

It was discovered that pyasn1 incorrectly handled recursion when decoding ASN.1 data. An attacker could use this issue to cause pyasn1 to consume resources, leading to a denial of service.

References

Affected packages

Ubuntu:22.04:LTS / pyasn1

Package

Name
pyasn1
Purl
pkg:deb/ubuntu/pyasn1@0.4.8-1ubuntu0.2?arch=source&distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.4.8-1ubuntu0.2

Affected versions

0.*
0.4.8-1
0.4.8-1ubuntu0.1

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "pypy-pyasn1",
            "binary_version": "0.4.8-1ubuntu0.2"
        },
        {
            "binary_name": "python3-pyasn1",
            "binary_version": "0.4.8-1ubuntu0.2"
        }
    ],
    "availability": "No subscription required"
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-8129-1.json"
cves_map
{
    "ecosystem": "Ubuntu:22.04:LTS",
    "cves": [
        {
            "severity": [
                {
                    "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
                    "type": "CVSS_V3"
                },
                {
                    "score": "medium",
                    "type": "Ubuntu"
                }
            ],
            "id": "CVE-2026-30922"
        }
    ]
}

Ubuntu:24.04:LTS / pyasn1

Package

Name
pyasn1
Purl
pkg:deb/ubuntu/pyasn1@0.4.8-4ubuntu0.2?arch=source&distro=noble

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.4.8-4ubuntu0.2

Affected versions

0.*
0.4.8-4
0.4.8-4ubuntu0.1

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "python3-pyasn1",
            "binary_version": "0.4.8-4ubuntu0.2"
        }
    ],
    "availability": "No subscription required"
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-8129-1.json"
cves_map
{
    "ecosystem": "Ubuntu:24.04:LTS",
    "cves": [
        {
            "severity": [
                {
                    "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
                    "type": "CVSS_V3"
                },
                {
                    "score": "medium",
                    "type": "Ubuntu"
                }
            ],
            "id": "CVE-2026-30922"
        }
    ]
}

Ubuntu:25.10 / pyasn1

Package

Name
pyasn1
Purl
pkg:deb/ubuntu/pyasn1@0.6.1-1ubuntu0.2?arch=source&distro=questing

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.6.1-1ubuntu0.2

Affected versions

0.*
0.6.1-1
0.6.1-1ubuntu0.1

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "python3-pyasn1",
            "binary_version": "0.6.1-1ubuntu0.2"
        }
    ],
    "availability": "No subscription required"
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-8129-1.json"
cves_map
{
    "ecosystem": "Ubuntu:25.10",
    "cves": [
        {
            "severity": [
                {
                    "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
                    "type": "CVSS_V3"
                },
                {
                    "score": "medium",
                    "type": "Ubuntu"
                }
            ],
            "id": "CVE-2026-30922"
        }
    ]
}