A flaw was found in python. An improperly handled HTTP response in the HTTP client code of python may allow a remote attacker, who controls the HTTP server, to make the client script enter an infinite loop, consuming CPU time. The highest threat from this vulnerability is to system availability.
The product contains an iteration or loop with an exit condition that cannot be reached, i.e., an infinite loop.
The product does not properly control the allocation and maintenance of a limited resource.
Link | Tags |
---|---|
https://bugs.python.org/issue44022 | issue tracking exploit vendor advisory |
https://github.com/python/cpython/pull/25916 | third party advisory patch |
https://bugzilla.redhat.com/show_bug.cgi?id=1995162 | issue tracking third party advisory patch |
https://github.com/python/cpython/pull/26503 | third party advisory patch |
https://ubuntu.com/security/CVE-2021-3737 | third party advisory patch |
https://www.oracle.com/security-alerts/cpujul2022.html | third party advisory patch |
https://python-security.readthedocs.io/vuln/urllib-100-continue-loop.html | third party advisory patch |
https://security.netapp.com/advisory/ntap-20220407-0009/ | third party advisory |
https://lists.debian.org/debian-lts-announce/2023/05/msg00024.html | mailing list |
https://lists.debian.org/debian-lts-announce/2023/06/msg00039.html | mailing list |