Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2022-45061

Опубликовано: 09 нояб. 2022
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS3: 7.5

Описание

An issue was discovered in Python before 3.11.1. An unnecessary quadratic algorithm exists in one path when processing some inputs to the IDNA (RFC 3490) decoder, such that a crafted, unreasonably long name being presented to the decoder could lead to a CPU denial of service. Hostnames are often supplied by remote servers that could be controlled by a malicious actor; in such a scenario, they could trigger excessive CPU consumption on the client attempting to make use of an attacker-supplied supposed hostname. For example, the attack payload could be placed in the Location header of an HTTP response with status code 302. A fix is planned in 3.11.1, 3.10.9, 3.9.16, 3.8.16, and 3.7.16.

РелизСтатусПримечание
bionic

DNE

esm-infra/focal

DNE

focal

DNE

jammy

DNE

kinetic

DNE

trusty

ignored

end of standard support
upstream

needs-triage

xenial

ignored

end of standard support

Показывать по

РелизСтатусПримечание
bionic

released

2.7.17-1~18.04ubuntu1.10
devel

DNE

esm-apps/focal

released

2.7.18-1~20.04.7+esm4
esm-apps/jammy

released

2.7.18-13ubuntu1.5+esm3
esm-infra-legacy/trusty

not-affected

2.7.6-8ubuntu0.6+esm13
esm-infra/bionic

not-affected

2.7.17-1~18.04ubuntu1.10
esm-infra/xenial

released

2.7.12-1ubuntu0~16.04.18+esm3
focal

ignored

end of standard support, was needed
jammy

needed

kinetic

ignored

end of life, was needs-triage

Показывать по

РелизСтатусПримечание
bionic

DNE

devel

DNE

esm-infra/focal

DNE

focal

DNE

jammy

released

3.10.6-1~22.04.2
kinetic

released

3.10.7-1ubuntu0.2
lunar

DNE

mantic

DNE

noble

DNE

oracular

DNE

Показывать по

РелизСтатусПримечание
bionic

DNE

devel

DNE

esm-apps/jammy

released

3.11.0~rc1-1~22.04.1~esm1
esm-infra/focal

DNE

focal

DNE

jammy

needed

kinetic

ignored

end of life, was needed
lunar

not-affected

3.11.1-2
mantic

not-affected

3.11.1-2
noble

DNE

Показывать по

РелизСтатусПримечание
bionic

DNE

esm-infra-legacy/trusty

needed

esm-infra/focal

DNE

focal

DNE

jammy

DNE

kinetic

DNE

trusty

ignored

end of standard support
trusty/esm

ignored

end of ESM support, was needed
upstream

needs-triage

xenial

DNE

Показывать по

РелизСтатусПримечание
bionic

DNE

esm-infra-legacy/trusty

not-affected

3.5.2-2ubuntu0~16.04.4~14.04.1+esm1
esm-infra/focal

DNE

esm-infra/xenial

released

3.5.2-2ubuntu0~16.04.13+esm6
focal

DNE

jammy

DNE

kinetic

DNE

trusty

ignored

end of standard support
trusty/esm

released

3.5.2-2ubuntu0~16.04.4~14.04.1+esm1
upstream

needs-triage

Показывать по

РелизСтатусПримечание
bionic

released

3.6.9-1~18.04ubuntu1.9
esm-infra/bionic

not-affected

3.6.9-1~18.04ubuntu1.9
esm-infra/focal

DNE

focal

DNE

jammy

DNE

kinetic

DNE

trusty

DNE

upstream

needs-triage

xenial

DNE

Показывать по

РелизСтатусПримечание
bionic

ignored

end of standard support, was needs-triage
esm-apps/bionic

released

3.7.5-2ubuntu1~18.04.2+esm3
esm-infra/focal

DNE

focal

DNE

jammy

DNE

kinetic

DNE

trusty

DNE

upstream

needs-triage

xenial

DNE

Показывать по

РелизСтатусПримечание
bionic

ignored

end of standard support, was needs-triage
esm-apps/bionic

released

3.8.0-3ubuntu1~18.04.2+esm2
esm-infra/focal

not-affected

3.8.10-0ubuntu1~20.04.6
focal

released

3.8.10-0ubuntu1~20.04.6
jammy

DNE

kinetic

DNE

trusty

DNE

upstream

needs-triage

xenial

DNE

Показывать по

РелизСтатусПримечание
bionic

DNE

esm-apps/focal

released

3.9.5-3ubuntu0~20.04.1+esm1
focal

ignored

end of standard support, was needed
jammy

DNE

kinetic

DNE

trusty

DNE

upstream

needs-triage

xenial

DNE

Показывать по

EPSS

Процентиль: 25%
0.0008
Низкий

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 7.5
redhat
больше 2 лет назад

An issue was discovered in Python before 3.11.1. An unnecessary quadratic algorithm exists in one path when processing some inputs to the IDNA (RFC 3490) decoder, such that a crafted, unreasonably long name being presented to the decoder could lead to a CPU denial of service. Hostnames are often supplied by remote servers that could be controlled by a malicious actor; in such a scenario, they could trigger excessive CPU consumption on the client attempting to make use of an attacker-supplied supposed hostname. For example, the attack payload could be placed in the Location header of an HTTP response with status code 302. A fix is planned in 3.11.1, 3.10.9, 3.9.16, 3.8.16, and 3.7.16.

CVSS3: 7.5
nvd
больше 2 лет назад

An issue was discovered in Python before 3.11.1. An unnecessary quadratic algorithm exists in one path when processing some inputs to the IDNA (RFC 3490) decoder, such that a crafted, unreasonably long name being presented to the decoder could lead to a CPU denial of service. Hostnames are often supplied by remote servers that could be controlled by a malicious actor; in such a scenario, they could trigger excessive CPU consumption on the client attempting to make use of an attacker-supplied supposed hostname. For example, the attack payload could be placed in the Location header of an HTTP response with status code 302. A fix is planned in 3.11.1, 3.10.9, 3.9.16, 3.8.16, and 3.7.16.

CVSS3: 7.5
msrc
больше 2 лет назад

Описание отсутствует

CVSS3: 7.5
debian
больше 2 лет назад

An issue was discovered in Python before 3.11.1. An unnecessary quadra ...

suse-cvrf
больше 2 лет назад

Security update for python36

EPSS

Процентиль: 25%
0.0008
Низкий

7.5 High

CVSS3

Уязвимость CVE-2022-45061