{"id":"CVE-2021-3737","details":"A flaw was found in python. An improperly handled HTTP response in the HTTP client code of python may allow a remote attacker, who controls the HTTP server, to make the client script enter an infinite loop, consuming CPU time. The highest threat from this vulnerability is to system availability.","aliases":["BIT-libpython-2021-3737","BIT-python-2021-3737","BIT-python-min-2021-3737","PSF-2022-7"],"modified":"2026-05-15T12:04:38.078181202Z","published":"2022-03-04T19:15:08.730Z","related":["ALSA-2021:4160","ALSA-2022:1764","ALSA-2022:1821","ALSA-2022:1986","SUSE-SU-2021:3477-1","SUSE-SU-2021:3486-1","SUSE-SU-2021:3489-1","SUSE-SU-2021:3524-1","SUSE-SU-2021:4015-1","SUSE-SU-2021:4015-2","SUSE-SU-2021:4104-1","SUSE-SU-2022:1485-1","openSUSE-SU-2021:1418-1","openSUSE-SU-2021:3489-1","openSUSE-SU-2021:4104-1","openSUSE-SU-2024:11202-1","openSUSE-SU-2024:11284-1","openSUSE-SU-2024:11286-1"],"database_specific":{"unresolved_ranges":[{"vendor_product":"canonical:ubuntu_linux","extracted_events":[{"last_affected":"14.04"},{"last_affected":"16.04"},{"last_affected":"18.04"},{"last_affected":"20.04"},{"last_affected":"21.04"}],"source":"CPE_FIELD","cpes":["cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*","cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*","cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*","cpe:2.3:o:canonical:ubuntu_linux:21.04:*:*:*:*:*:*:*"]},{"vendor_product":"fedoraproject:fedora","extracted_events":[{"last_affected":"33"},{"last_affected":"34"}],"source":"CPE_FIELD","cpes":["cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*","cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*"]},{"vendor_product":"oracle:communications_cloud_native_core_binding_support_function","extracted_events":[{"last_affected":"22.1.3"}],"source":"CPE_FIELD","cpes":["cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:22.1.3:*:*:*:*:*:*:*"]},{"vendor_product":"oracle:communications_cloud_native_core_network_exposure_function","extracted_events":[{"last_affected":"22.1.1"}],"source":"CPE_FIELD","cpes":["cpe:2.3:a:oracle:communications_cloud_native_core_network_exposure_function:22.1.1:*:*:*:*:*:*:*"]},{"vendor_product":"oracle:communications_cloud_native_core_policy","extracted_events":[{"last_affected":"22.2.0"}],"source":"CPE_FIELD","cpes":["cpe:2.3:a:oracle:communications_cloud_native_core_policy:22.2.0:*:*:*:*:*:*:*"]},{"vendor_product":"redhat:codeready_linux_builder","extracted_events":[{"last_affected":"8.0"}],"source":"CPE_FIELD","cpes":["cpe:2.3:a:redhat:codeready_linux_builder:8.0:*:*:*:*:*:*:*"]},{"vendor_product":"redhat:codeready_linux_builder_for_ibm_z_systems","extracted_events":[{"last_affected":"8.0"}],"source":"CPE_FIELD","cpes":["cpe:2.3:a:redhat:codeready_linux_builder_for_ibm_z_systems:8.0:*:*:*:*:*:*:*"]},{"vendor_product":"redhat:codeready_linux_builder_for_power_little_endian","extracted_events":[{"last_affected":"8.0"}],"source":"CPE_FIELD","cpes":["cpe:2.3:a:redhat:codeready_linux_builder_for_power_little_endian:8.0:*:*:*:*:*:*:*"]},{"vendor_product":"redhat:enterprise_linux","extracted_events":[{"last_affected":"6.0"},{"last_affected":"7.0"},{"last_affected":"8.0"}],"source":"CPE_FIELD","cpes":["cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*","cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*","cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*"]},{"vendor_product":"redhat:enterprise_linux_for_ibm_z_systems","extracted_events":[{"last_affected":"8.0"}],"source":"CPE_FIELD","cpes":["cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:8.0:*:*:*:*:*:*:*"]},{"vendor_product":"redhat:enterprise_linux_for_power_little_endian","extracted_events":[{"last_affected":"8.0"}],"source":"CPE_FIELD","cpes":["cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:8.0:*:*:*:*:*:*:*"]}]},"references":[{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2023/05/msg00024.html"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2023/06/msg00039.html"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2024/11/msg00024.html"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2024/12/msg00000.html"},{"type":"ADVISORY","url":"https://security.netapp.com/advisory/ntap-20220407-0009/"},{"type":"REPORT","url":"https://bugs.python.org/issue44022"},{"type":"FIX","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1995162"},{"type":"FIX","url":"https://github.com/python/cpython/pull/25916"},{"type":"FIX","url":"https://github.com/python/cpython/pull/26503"},{"type":"FIX","url":"https://python-security.readthedocs.io/vuln/urllib-100-continue-loop.html"},{"type":"FIX","url":"https://ubuntu.com/security/CVE-2021-3737"},{"type":"FIX","url":"https://www.oracle.com/security-alerts/cpujul2022.html"}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}]}