QID 355271
Date Published: 2023-05-29
QID 355271: Amazon Linux Security Advisory for python3.9 : ALAS2023-2023-116
A flaw was found in python.
In algorithms with quadratic time complexity using non-binary bases, when using int(text), a system could take 50ms to parse an int string with 100,000 digits and 5s for 1,000,000 digits (float, decimal, int.from_bytes(), and int() for binary bases 2, 4, 8, 16, and 32 are not affected).
The highest threat from this vulnerability is to system availability. (
( CVE-2020-10735) an issue in the urllib.parse component of python before v3.11 allows attackers to bypass blocklisting methods by supplying a url that starts with blank characters. (
( CVE-2023-24329)
Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.
Successful exploitation of this vulnerability could lead to a securitybreach or could affect integrity, availability, and confidentiality.
Solution
Please refer to Amazon advisory: ALAS2023-2023-116 for affected packages and patching details, or update with your package manager.
Vendor References
- ALAS2023-2023-116 -
alas.aws.amazon.com/AL2023/ALAS-2023-116.html
CVEs related to QID 355271
Software Advisories
| Advisory ID | Software | Component | Link |
|---|---|---|---|
| ALAS2023-2023-116 | amazon linux 2023 |
|