Debian Package Tracker
Register | Log in
Subscribe

pyasn1

Choose email to subscribe with

general
  • source: pyasn1 (main)
  • version: 0.6.3-1
  • maintainer: Debian Python Team (DMD)
  • uploaders: Deepak Tripathi [DMD] – Vincent Bernat [DMD] – Jan Lübbe [DMD] – Alexandre Detiste [DMD]
  • arch: all
  • std-ver: 4.7.3
  • VCS: Git (Browse, QA)
versions [more versions can be listed by madison] [old versions available from snapshot.debian.org]
[pool directory]
  • o-o-stable: 0.4.8-1
  • o-o-sec: 0.4.8-1+deb11u1
  • oldstable: 0.4.8-3
  • old-sec: 0.4.8-3+deb12u1
  • old-p-u: 0.4.8-3+deb12u1
  • stable: 0.6.1-1+deb13u1
  • stable-sec: 0.6.1-1+deb13u1
  • stable-bpo: 0.6.2-1~bpo13+1
  • testing: 0.6.3-1
  • unstable: 0.6.3-1
versioned links
  • 0.4.8-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 0.4.8-1+deb11u1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 0.4.8-3: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 0.4.8-3+deb12u1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 0.6.1-1+deb13u1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 0.6.2-1~bpo13+1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 0.6.3-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
binaries
  • python-pyasn1-doc
  • python3-pyasn1
action needed
1 security issue in trixie high

There is 1 open security issue in trixie.

1 important issue:
  • CVE-2026-30922: pyasn1 is a generic ASN.1 library for Python. Prior to 0.6.3, the `pyasn1` library is vulnerable to a Denial of Service (DoS) attack caused by uncontrolled recursion when decoding ASN.1 data with deeply nested structures. An attacker can supply a crafted payload containing thousands of nested `SEQUENCE` (`0x30`) or `SET` (`0x31`) tags with "Indefinite Length" (`0x80`) markers. This forces the decoder to recursively call itself until the Python interpreter crashes with a `RecursionError` or consumes all available memory (OOM), crashing the host application. This is a distinct vulnerability from CVE-2026-23490 (which addressed integer overflows in OID decoding). The fix for CVE-2026-23490 (`MAX_OID_ARC_CONTINUATION_OCTETS`) does not mitigate this recursion issue. Version 0.6.3 fixes this specific issue.
Created: 2026-03-18 Last update: 2026-03-23 08:30
1 security issue in bullseye high

There is 1 open security issue in bullseye.

1 important issue:
  • CVE-2026-30922: pyasn1 is a generic ASN.1 library for Python. Prior to 0.6.3, the `pyasn1` library is vulnerable to a Denial of Service (DoS) attack caused by uncontrolled recursion when decoding ASN.1 data with deeply nested structures. An attacker can supply a crafted payload containing thousands of nested `SEQUENCE` (`0x30`) or `SET` (`0x31`) tags with "Indefinite Length" (`0x80`) markers. This forces the decoder to recursively call itself until the Python interpreter crashes with a `RecursionError` or consumes all available memory (OOM), crashing the host application. This is a distinct vulnerability from CVE-2026-23490 (which addressed integer overflows in OID decoding). The fix for CVE-2026-23490 (`MAX_OID_ARC_CONTINUATION_OCTETS`) does not mitigate this recursion issue. Version 0.6.3 fixes this specific issue.
Created: 2026-03-18 Last update: 2026-03-23 08:30
1 security issue in bookworm high

There is 1 open security issue in bookworm.

1 important issue:
  • CVE-2026-30922: pyasn1 is a generic ASN.1 library for Python. Prior to 0.6.3, the `pyasn1` library is vulnerable to a Denial of Service (DoS) attack caused by uncontrolled recursion when decoding ASN.1 data with deeply nested structures. An attacker can supply a crafted payload containing thousands of nested `SEQUENCE` (`0x30`) or `SET` (`0x31`) tags with "Indefinite Length" (`0x80`) markers. This forces the decoder to recursively call itself until the Python interpreter crashes with a `RecursionError` or consumes all available memory (OOM), crashing the host application. This is a distinct vulnerability from CVE-2026-23490 (which addressed integer overflows in OID decoding). The fix for CVE-2026-23490 (`MAX_OID_ARC_CONTINUATION_OCTETS`) does not mitigate this recursion issue. Version 0.6.3 fixes this specific issue.
Created: 2026-03-18 Last update: 2026-03-23 08:30
lintian reports 3 warnings normal
Lintian reports 3 warnings about this package. You should make the package lintian clean getting rid of them.
Created: 2026-03-21 Last update: 2026-03-21 05:01
debian/patches: 1 patch to forward upstream low

Among the 1 debian patch available in version 0.6.3-1 of the package, we noticed the following issues:

  • 1 patch where the metadata indicates that the patch has not yet been forwarded upstream. You should either forward the patch upstream or update the metadata to document its real status.
Created: 2023-02-26 Last update: 2026-03-21 11:30
news
[rss feed]
  • [2026-03-24] pyasn1 0.6.3-1 MIGRATED to testing (Debian testing watch)
  • [2026-03-20] Accepted pyasn1 0.6.3-1 (source) into unstable (Alexandre Detiste)
  • [2026-03-05] Accepted pyasn1 0.6.2-1~bpo13+1 (source all) into stable-backports (Debian FTP Masters) (signed by: Christopher Obbard)
  • [2026-02-01] Accepted pyasn1 0.4.8-1+deb11u1 (source) into oldoldstable-security (Utkarsh Gupta)
  • [2026-01-29] Accepted pyasn1 0.4.8-3+deb12u1 (source) into oldstable-proposed-updates (Debian FTP Masters) (signed by: Salvatore Bonaccorso)
  • [2026-01-29] Accepted pyasn1 0.6.1-1+deb13u1 (source) into proposed-updates (Debian FTP Masters) (signed by: Salvatore Bonaccorso)
  • [2026-01-28] Accepted pyasn1 0.4.8-3+deb12u1 (source) into oldstable-security (Debian FTP Masters) (signed by: Salvatore Bonaccorso)
  • [2026-01-28] Accepted pyasn1 0.6.1-1+deb13u1 (source) into stable-security (Debian FTP Masters) (signed by: Salvatore Bonaccorso)
  • [2026-01-22] pyasn1 0.6.2-1 MIGRATED to testing (Debian testing watch)
  • [2026-01-19] Accepted pyasn1 0.6.2-1 (source) into unstable (Alexandre Detiste)
  • [2025-02-28] pyasn1 0.6.1-1 MIGRATED to testing (Debian testing watch)
  • [2025-02-13] Accepted pyasn1 0.6.1-1 (source) into unstable (Alexandre Detiste)
  • [2024-08-29] pyasn1 0.6.0-1 MIGRATED to testing (Debian testing watch)
  • [2024-08-22] Accepted pyasn1 0.6.0-1 (source) into unstable (Alexandre Detiste)
  • [2024-04-15] pyasn1 0.5.1-1 MIGRATED to testing (Debian testing watch)
  • [2024-04-08] Accepted pyasn1 0.5.1-1 (source) into unstable (Thomas Goirand)
  • [2023-07-19] pyasn1 0.4.8-4 MIGRATED to testing (Debian testing watch)
  • [2023-07-13] Accepted pyasn1 0.4.8-4 (source) into unstable (Bastian Germann) (signed by: bage@debian.org)
  • [2022-12-30] pyasn1 0.4.8-3 MIGRATED to testing (Debian testing watch)
  • [2022-12-24] Accepted pyasn1 0.4.8-3 (source) into unstable (Jochen Sprickerhof)
  • [2022-10-29] pyasn1 0.4.8-2.1 MIGRATED to testing (Debian testing watch)
  • [2022-10-23] Accepted pyasn1 0.4.8-2.1 (source) into unstable (Paul Gevers)
  • [2022-06-13] pyasn1 0.4.8-2 MIGRATED to testing (Debian testing watch)
  • [2022-06-03] Accepted pyasn1 0.4.8-2 (source) into unstable (Sandro Tosi)
  • [2020-07-24] pyasn1 0.4.8-1 MIGRATED to testing (Debian testing watch)
  • [2020-07-17] Accepted pyasn1 0.4.8-1 (source) into unstable (Tristan Seligmann)
  • [2020-04-12] pyasn1 0.4.2-4 MIGRATED to testing (Debian testing watch)
  • [2020-04-05] Accepted pyasn1 0.4.2-4 (source) into unstable (Sandro Tosi)
  • [2018-01-14] pyasn1 0.4.2-3 MIGRATED to testing (Debian testing watch)
  • [2018-01-09] Accepted pyasn1 0.4.2-3 (source) into unstable (Tristan Seligmann)
  • 1
  • 2
bugs [bug history graph]
  • all: 0
links
  • homepage
  • lintian (0, 3)
  • buildd: logs, reproducibility
  • popcon
  • browse source code
  • edit tags
  • other distros
  • security tracker
  • debian patches
  • debci
ubuntu Ubuntu logo [Information about Ubuntu for Debian Developers]
  • version: 0.6.2-1
  • 3 bugs

Debian Package Tracker — Copyright 2013-2025 The Distro Tracker Developers
Report problems to the tracker.debian.org pseudo-package in the Debian BTS.
Documentation — Bugs — Git Repository — Contributing