vulnerability
Arch Linux: Denial of service (CVE-2021-33503)
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 5 | (AV:N/AC:L/Au:N/C:N/I:N/A:P) | Jun 29, 2021 | Jul 11, 2025 | Nov 27, 2025 |
Severity
5
CVSS
(AV:N/AC:L/Au:N/C:N/I:N/A:P)
Published
Jun 29, 2021
Added
Jul 11, 2025
Modified
Nov 27, 2025
Description
A security issue has been found in python-urllib3 before version 1.26.5. When provided with a URL containing many @ characters in the authority component, the authority regular expression exhibits catastrophic backtracking, causing a denial of service if a URL was passed as a parameter or redirected to via an HTTP redirect.
Solution
arch-linux-upgrade-latest
References
- CVE-2021-33503
- https://attackerkb.com/topics/CVE-2021-33503
- URL-https://github.com/advisories/GHSA-q2q7-5pp4-w6pg
- URL-https://github.com/urllib3/urllib3/commit/2d4a3fee6de2fa45eb82169361918f759269b4ec
- URL-https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6SCV7ZNAHS3E6PBFLJGENCDRDRWRZZ6W/
- URL-https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FMUGWEAUYGGHTPPXT6YBD53WYXQGVV73/
- URL-https://security.archlinux.org/ASA-202106-25
- URL-https://security.gentoo.org/glsa/202107-36
- URL-https://www.oracle.com/security-alerts/cpuoct2021.html
- CWE-400
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.