A flaw was found in python. An improperly handled HTTP response in the HTTP client code of python may allow a remote attacker, who controls the HTTP server, to make the client script enter an infinite loop, consuming CPU time. The highest threat from this vulnerability is to system availability.
References
| Link | Resource |
|---|---|
| https://github.com/python/cpython/pull/25916 | Patch Third Party Advisory |
| https://bugzilla.redhat.com/show_bug.cgi?id=1995162 | Issue Tracking Patch Third Party Advisory |
| https://ubuntu.com/security/CVE-2021-3737 | Patch Third Party Advisory |
| https://github.com/python/cpython/pull/26503 | Patch Third Party Advisory |
| https://bugs.python.org/issue44022 | Exploit Issue Tracking Vendor Advisory |
| https://python-security.readthedocs.io/vuln/urllib-100-continue-loop.html | Patch Third Party Advisory |
| https://security.netapp.com/advisory/ntap-20220407-0009/ | Third Party Advisory |
| https://www.oracle.com/security-alerts/cpujul2022.html | Patch Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
Configuration 6 (hide)
|
Information
Published : 2022-03-04 11:15
Updated : 2023-02-02 09:07
NVD link : CVE-2021-3737
Mitre link : CVE-2021-3737
JSON object : View
CWE
Products Affected
redhat
- enterprise_linux_for_power_little_endian
- codeready_linux_builder_for_ibm_z_systems
- enterprise_linux
- enterprise_linux_for_ibm_z_systems
- codeready_linux_builder
- codeready_linux_builder_for_power_little_endian
oracle
- communications_cloud_native_core_network_exposure_function
- communications_cloud_native_core_binding_support_function
- communications_cloud_native_core_policy
python
- python
fedoraproject
- fedora
canonical
- ubuntu_linux
netapp
- hci
- ontap_select_deploy_administration_utility
- xcp_nfs
- management_services_for_element_software
- netapp_xcp_smb


