Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

SUSE-SU-2024:1428-1

Опубликовано: 24 апр. 2024
Источник: suse-cvrf

Описание

Security update for python-idna

This update for python-idna fixes the following issues:

  • CVE-2024-3651: Fixed potential DoS via resource consumption via specially crafted inputs to idna.encode() (bsc#1222842).

Список пакетов

Image SLES12-SP5-Azure-BYOS
python-idna-2.5-3.13.1
python3-idna-2.5-3.13.1
Image SLES12-SP5-Azure-Basic-On-Demand
python3-idna-2.5-3.13.1
Image SLES12-SP5-Azure-HPC-BYOS
python-idna-2.5-3.13.1
python3-idna-2.5-3.13.1
Image SLES12-SP5-Azure-HPC-On-Demand
python3-idna-2.5-3.13.1
Image SLES12-SP5-Azure-SAP-BYOS
python-idna-2.5-3.13.1
python3-idna-2.5-3.13.1
Image SLES12-SP5-Azure-SAP-On-Demand
python-idna-2.5-3.13.1
python3-idna-2.5-3.13.1
Image SLES12-SP5-Azure-Standard-On-Demand
python3-idna-2.5-3.13.1
Image SLES12-SP5-EC2-BYOS
python-idna-2.5-3.13.1
python3-idna-2.5-3.13.1
Image SLES12-SP5-EC2-ECS-On-Demand
python-idna-2.5-3.13.1
python3-idna-2.5-3.13.1
Image SLES12-SP5-EC2-On-Demand
python-idna-2.5-3.13.1
python3-idna-2.5-3.13.1
Image SLES12-SP5-EC2-SAP-BYOS
python-idna-2.5-3.13.1
python3-idna-2.5-3.13.1
Image SLES12-SP5-EC2-SAP-On-Demand
python-idna-2.5-3.13.1
python3-idna-2.5-3.13.1
Image SLES12-SP5-GCE-BYOS
python-idna-2.5-3.13.1
python3-idna-2.5-3.13.1
Image SLES12-SP5-GCE-On-Demand
python3-idna-2.5-3.13.1
Image SLES12-SP5-GCE-SAP-BYOS
python-idna-2.5-3.13.1
python3-idna-2.5-3.13.1
Image SLES12-SP5-GCE-SAP-On-Demand
python-idna-2.5-3.13.1
python3-idna-2.5-3.13.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
python-idna-2.5-3.13.1
Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production
python-idna-2.5-3.13.1
SUSE Linux Enterprise Module for Public Cloud 12
python-idna-2.5-3.13.1
python3-idna-2.5-3.13.1
SUSE Linux Enterprise Server 12 SP5
python-idna-2.5-3.13.1
python3-idna-2.5-3.13.1
SUSE Linux Enterprise Server for SAP Applications 12 SP5
python-idna-2.5-3.13.1
python3-idna-2.5-3.13.1

Описание

A vulnerability was identified in the kjd/idna library, specifically within the `idna.encode()` function, affecting version 3.6. The issue arises from the function's handling of crafted input strings, which can lead to quadratic complexity and consequently, a denial of service condition. This vulnerability is triggered by a crafted input that causes the `idna.encode()` function to process the input with considerable computational load, significantly increasing the processing time in a quadratic manner relative to the input size.


Затронутые продукты
Image SLES12-SP5-Azure-BYOS:python-idna-2.5-3.13.1
Image SLES12-SP5-Azure-BYOS:python3-idna-2.5-3.13.1
Image SLES12-SP5-Azure-Basic-On-Demand:python3-idna-2.5-3.13.1
Image SLES12-SP5-Azure-HPC-BYOS:python-idna-2.5-3.13.1

Ссылки