Bug 1995162 (CVE-2021-3737)
Summary: | CVE-2021-3737 python: urllib: HTTP client possible infinite loop on a 100 Continue response | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Pedro Sampaio <psampaio> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED ERRATA | QA Contact: | |
Severity: | low | Docs Contact: | |
Priority: | low | ||
Version: | unspecified | CC: | adev88, carl, caswilli, cstratak, dmalcolm, extras-orphan, fjansen, hhorak, jeffrey.ness, jorton, kaycoth, manisandro, m.cyprian, mhroncok, psegedy, pviktori, python-maint, python-sig, qydwhotmail, rkuska, rschiron, shcherbina.iryna, slavek.kabrda, thrnciar, TicoTimo, torsava, vstinner |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | python 3.6.14, python 3.7.11, python 3.8.11, python 3.9.6 | Doc Type: | If docs needed, set a value |
Doc Text: |
A flaw was found in python. An improperly handled HTTP response in the HTTP client code of python may allow a remote attacker, who controls the HTTP server, to make the client script enter an infinite loop, consuming CPU time. The highest threat from this vulnerability is to system availability.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | 2022-05-11 09:45:29 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 1997669, 1997670, 1997671, 1997672, 1997673, 1997674, 1997675, 1997676, 1997677, 1997679, 1997680, 1997681, 1997682, 1997683, 1997684, 1997685, 1997686, 1997687, 1997688, 1997689, 1997690, 1997691, 2064450, 2189263 | ||
Bug Blocks: | 1995165, 2003969 |
Description
Pedro Sampaio
2021-08-18 14:50:00 UTC
Setting CVSS score to 6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H . User Interaction (UI) set to Required (R) because the flaw is in the HTTP client code, thus the attack scenario that was considered is that of a user running a python script/tool to erroneously connect to a malicious HTTP server. Libraries or tools that do not require user interaction are assumed to connect to trusted servers which would need to be compromised by an attacker first in order to trigger this vulnerability. In this last case, you'd have UI=N, but AC=H giving a CVSSv3.1 score of 5.9 that is lower than the current 6.5. For this reason we chose to evaluate the worst-case reasonable scenario. Given the flaw is in the client side and it requires automatically connecting to a compromised but trusted server or manually connecting to a malicious server, the Impact of this flaw has been set to Low. It requires indeed unlikely circumstances to be able to be exploited and when it is it is enough to stop the client or restart it. Created mingw-python3 tracking bugs for this issue: Affects: fedora-all [bug 1997670] Created python2.7 tracking bugs for this issue: Affects: fedora-all [bug 1997671] Created python3.10 tracking bugs for this issue: Affects: fedora-all [bug 1997672] Created python3.5 tracking bugs for this issue: Affects: fedora-all [bug 1997673] Created python3.6 tracking bugs for this issue: Affects: fedora-all [bug 1997674] Created python3.7 tracking bugs for this issue: Affects: fedora-all [bug 1997675] Created python3.8 tracking bugs for this issue: Affects: fedora-all [bug 1997676] Created python3.9 tracking bugs for this issue: Affects: fedora-all [bug 1997677] Created python34 tracking bugs for this issue: Affects: epel-all [bug 1997669] This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2021:4160 https://access.redhat.com/errata/RHSA-2021:4160 This issue has been addressed in the following products: Red Hat Software Collections for Red Hat Enterprise Linux 7 Via RHSA-2022:1663 https://access.redhat.com/errata/RHSA-2022:1663 This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2022:1764 https://access.redhat.com/errata/RHSA-2022:1764 This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2022:1821 https://access.redhat.com/errata/RHSA-2022:1821 This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2022:1986 https://access.redhat.com/errata/RHSA-2022:1986 This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2021-3737 |