Description
An issue was discovered in Python before 3.11.1. An unnecessary quadratic algorithm exists in one path when processing some inputs to the IDNA (RFC 3490) decoder, such that a crafted, unreasonably long name being presented to the decoder could lead to a CPU denial of service. Hostnames are often supplied by remote servers that could be controlled by a malicious actor; in such a scenario, they could trigger excessive CPU consumption on the client attempting to make use of an attacker-supplied supposed hostname. For example, the attack payload could be placed in the Location header of an HTTP response with status code 302. A fix is planned in 3.11.1, 3.10.9, 3.9.16, 3.8.16, and 3.7.16.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-3432-1 | python2.7 security update |
Debian DLA |
DLA-3477-1 | python3.7 security update |
Debian DLA |
DLA-3966-1 | pypy3 security update |
Debian DLA |
DLA-3980-1 | python3.9 security update |
EUVD |
EUVD-2022-47983 | An issue was discovered in Python before 3.11.1. An unnecessary quadratic algorithm exists in one path when processing some inputs to the IDNA (RFC 3490) decoder, such that a crafted, unreasonably long name being presented to the decoder could lead to a CPU denial of service. Hostnames are often supplied by remote servers that could be controlled by a malicious actor; in such a scenario, they could trigger excessive CPU consumption on the client attempting to make use of an attacker-supplied supposed hostname. For example, the attack payload could be placed in the Location header of an HTTP response with status code 302. A fix is planned in 3.11.1, 3.10.9, 3.9.16, 3.8.16, and 3.7.16. |
Ubuntu USN |
USN-5767-1 | Python vulnerabilities |
Ubuntu USN |
USN-5767-2 | Python vulnerability |
Ubuntu USN |
USN-5888-1 | Python vulnerabilities |
Ubuntu USN |
USN-6891-1 | Python vulnerabilities |
Ubuntu USN |
USN-7212-1 | Python 2.7 vulnerabilities |
References
History
Mon, 03 Nov 2025 22:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Wed, 16 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Thu, 01 May 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Subscriptions
Fedoraproject
Subscribe
Fedora
Subscribe
Netapp
Subscribe
Active Iq Unified Manager
Subscribe
Bootstrap Os
Subscribe
E-series Performance Analyzer
Subscribe
Element Software
Subscribe
Hci
Subscribe
Hci Compute Node
Subscribe
Management Services For Element Software
Subscribe
Ontap Select Deploy Administration Utility
Subscribe
Python
Subscribe
Python
Subscribe
Redhat
Subscribe
Enterprise Linux
Subscribe
Rhel Eus
Subscribe
Rhel Software Collections
Subscribe
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-11-03T21:46:44.155Z
Reserved: 2022-11-09T00:00:00.000Z
Link: CVE-2022-45061
Updated: 2025-11-03T21:46:44.155Z
Status : Modified
Published: 2022-11-09T07:15:09.887
Modified: 2025-11-03T22:16:01.150
Link: CVE-2022-45061
OpenCVE Enrichment
No data.
Debian DLA
EUVD
Ubuntu USN