CVE-2024-3651

NameCVE-2024-3651
DescriptionA vulnerability was identified in the kjd/idna library, specifically within the `idna.encode()` function, affecting version 3.6. The issue arises from the function's handling of crafted input strings, which can lead to quadratic complexity and consequently, a denial of service condition. This vulnerability is triggered by a crafted input that causes the `idna.encode()` function to process the input with considerable computational load, significantly increasing the processing time in a quadratic manner relative to the input size.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDLA-3811-1, ELA-1121-1
Debian Bugs1069127

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
python-idna (PTS)stretch (lts), stretch2.2-1+deb9u1fixed
buster (security), buster, buster (lts)2.6-1+deb10u1fixed
bullseye2.10-1+deb11u1fixed
bookworm3.3-1+deb12u1fixed
sid, trixie3.8-2fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
python-idnasourcestretch2.2-1+deb9u1ELA-1121-1
python-idnasourcebuster2.6-1+deb10u1DLA-3811-1
python-idnasourcebullseye2.10-1+deb11u1
python-idnasourcebookworm3.3-1+deb12u1
python-idnasource(unstable)3.6-2.11069127

Notes

https://github.com/kjd/idna/security/advisories/GHSA-jjg7-2v4v-x38h
https://bugzilla.redhat.com/show_bug.cgi?id=2274779
Fixed by: https://github.com/kjd/idna/commit/5beb28b9dd77912c0dd656d8b0fdba3eb80222e7 (v3.7)

Search for package or bug name: Reporting problems