QID 355271

Date Published: 2023-05-29

QID 355271: Amazon Linux Security Advisory for python3.9 : ALAS2023-2023-116

A flaw was found in python.
In algorithms with quadratic time complexity using non-binary bases, when using int(text), a system could take 50ms to parse an int string with 100,000 digits and 5s for 1,000,000 digits (float, decimal, int.from_bytes(), and int() for binary bases 2, 4, 8, 16, and 32 are not affected).
The highest threat from this vulnerability is to system availability. (
( CVE-2020-10735) an issue in the urllib.parse component of python before v3.11 allows attackers to bypass blocklisting methods by supplying a url that starts with blank characters. (
( CVE-2023-24329)



Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.

Successful exploitation of this vulnerability could lead to a securitybreach or could affect integrity, availability, and confidentiality.

  • CVSS V3 rated as High - 7.5 severity.
  • CVSS V2 rated as Medium - 5.4 severity.
  • Solution
    Please refer to Amazon advisory: ALAS2023-2023-116 for affected packages and patching details, or update with your package manager.
    Vendor References

    CVEs related to QID 355271

    Software Advisories
    Advisory ID Software Component Link
    ALAS2023-2023-116 amazon linux 2023 URL Logo alas.aws.amazon.com/AL2023/ALAS-2023-116.html