A flaw was found in python. An improperly handled HTTP response in the HTTP client code of python may allow a remote attacker, who controls the HTTP server, to make the client script enter an infinite loop, consuming CPU time. The highest threat from this vulnerability is to system availability.
{
"unresolved_ranges": [
{
"extracted_events": [
{
"last_affected": "22.1.3"
}
],
"source": "CPE_FIELD",
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:22.1.3:*:*:*:*:*:*:*"
},
{
"extracted_events": [
{
"last_affected": "22.1.1"
}
],
"source": "CPE_FIELD",
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_exposure_function:22.1.1:*:*:*:*:*:*:*"
},
{
"extracted_events": [
{
"last_affected": "22.2.0"
}
],
"source": "CPE_FIELD",
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:22.2.0:*:*:*:*:*:*:*"
},
{
"extracted_events": [
{
"last_affected": "8.0"
}
],
"source": "CPE_FIELD",
"cpe": "cpe:2.3:a:redhat:codeready_linux_builder:8.0:*:*:*:*:*:*:*"
},
{
"extracted_events": [
{
"last_affected": "8.0"
}
],
"source": "CPE_FIELD",
"cpe": "cpe:2.3:a:redhat:codeready_linux_builder_for_ibm_z_systems:8.0:*:*:*:*:*:*:*"
},
{
"extracted_events": [
{
"last_affected": "8.0"
}
],
"source": "CPE_FIELD",
"cpe": "cpe:2.3:a:redhat:codeready_linux_builder_for_power_little_endian:8.0:*:*:*:*:*:*:*"
},
{
"extracted_events": [
{
"last_affected": "14.04"
}
],
"source": "CPE_FIELD",
"cpe": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*"
},
{
"extracted_events": [
{
"last_affected": "16.04"
}
],
"source": "CPE_FIELD",
"cpe": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*"
},
{
"extracted_events": [
{
"last_affected": "18.04"
}
],
"source": "CPE_FIELD",
"cpe": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*"
},
{
"extracted_events": [
{
"last_affected": "20.04"
}
],
"source": "CPE_FIELD",
"cpe": "cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*"
},
{
"extracted_events": [
{
"last_affected": "21.04"
}
],
"source": "CPE_FIELD",
"cpe": "cpe:2.3:o:canonical:ubuntu_linux:21.04:*:*:*:*:*:*:*"
},
{
"extracted_events": [
{
"last_affected": "33"
}
],
"source": "CPE_FIELD",
"cpe": "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*"
},
{
"extracted_events": [
{
"last_affected": "34"
}
],
"source": "CPE_FIELD",
"cpe": "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*"
},
{
"extracted_events": [
{
"last_affected": "6.0"
}
],
"source": "CPE_FIELD",
"cpe": "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*"
},
{
"extracted_events": [
{
"last_affected": "7.0"
}
],
"source": "CPE_FIELD",
"cpe": "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*"
},
{
"extracted_events": [
{
"last_affected": "8.0"
}
],
"source": "CPE_FIELD",
"cpe": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*"
},
{
"extracted_events": [
{
"last_affected": "8.0"
}
],
"source": "CPE_FIELD",
"cpe": "cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:8.0:*:*:*:*:*:*:*"
},
{
"extracted_events": [
{
"last_affected": "8.0"
}
],
"source": "CPE_FIELD",
"cpe": "cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:8.0:*:*:*:*:*:*:*"
}
]
}{
"extracted_events": [
{
"introduced": "3.6.0"
},
{
"fixed": "3.6.14"
},
{
"introduced": "3.7.0"
},
{
"fixed": "3.7.11"
},
{
"introduced": "3.8.0"
},
{
"fixed": "3.8.11"
},
{
"introduced": "3.9.0"
},
{
"fixed": "3.9.6"
}
],
"source": "CPE_FIELD",
"cpe": "cpe:2.3:a:python:python:*:*:*:*:*:*:*:*"
}