vulnerability
SUSE: CVE-2021-3737: SUSE Linux Security Advisory
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
7 | (AV:N/AC:M/Au:N/C:N/I:N/A:C) | Sep 16, 2021 | Oct 21, 2021 | Oct 26, 2022 |
Severity
7
CVSS
(AV:N/AC:M/Au:N/C:N/I:N/A:C)
Published
Sep 16, 2021
Added
Oct 21, 2021
Modified
Oct 26, 2022
Description
A flaw was found in python. An improperly handled HTTP response in the HTTP client code of python may allow a remote attacker, who controls the HTTP server, to make the client script enter an infinite loop, consuming CPU time. The highest threat from this vulnerability is to system availability.
Solution(s)
suse-upgrade-libpython2_7-1_0suse-upgrade-libpython2_7-1_0-32bitsuse-upgrade-libpython3_4m1_0suse-upgrade-libpython3_4m1_0-32bitsuse-upgrade-libpython3_6m1_0suse-upgrade-libpython3_6m1_0-32bitsuse-upgrade-libpython3_9-1_0suse-upgrade-libpython3_9-1_0-32bitsuse-upgrade-pythonsuse-upgrade-python-32bitsuse-upgrade-python-basesuse-upgrade-python-base-32bitsuse-upgrade-python-cursessuse-upgrade-python-demosuse-upgrade-python-develsuse-upgrade-python-docsuse-upgrade-python-doc-pdfsuse-upgrade-python-gdbmsuse-upgrade-python-idlesuse-upgrade-python-tksuse-upgrade-python-xmlsuse-upgrade-python3suse-upgrade-python3-basesuse-upgrade-python3-cursessuse-upgrade-python3-dbmsuse-upgrade-python3-develsuse-upgrade-python3-docsuse-upgrade-python3-doc-devhelpsuse-upgrade-python3-idlesuse-upgrade-python3-testsuitesuse-upgrade-python3-tksuse-upgrade-python3-toolssuse-upgrade-python36suse-upgrade-python36-basesuse-upgrade-python39suse-upgrade-python39-32bitsuse-upgrade-python39-basesuse-upgrade-python39-base-32bitsuse-upgrade-python39-cursessuse-upgrade-python39-dbmsuse-upgrade-python39-develsuse-upgrade-python39-docsuse-upgrade-python39-doc-devhelpsuse-upgrade-python39-idlesuse-upgrade-python39-testsuitesuse-upgrade-python39-tksuse-upgrade-python39-tools

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.