Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-2808-1 | python3.5 security update |
Debian DLA |
DLA-3432-1 | python2.7 security update |
Debian DLA |
DLA-3477-1 | python3.7 security update |
Debian DLA |
DLA-3966-1 | pypy3 security update |
Debian DLA |
DLA-3980-1 | python3.9 security update |
EUVD |
EUVD-2021-27013 | A flaw was found in python. An improperly handled HTTP response in the HTTP client code of python may allow a remote attacker, who controls the HTTP server, to make the client script enter an infinite loop, consuming CPU time. The highest threat from this vulnerability is to system availability. |
Ubuntu USN |
USN-5083-1 | Python vulnerabilities |
Ubuntu USN |
USN-5199-1 | Python vulnerabilities |
Ubuntu USN |
USN-5200-1 | Python vulnerabilities |
Ubuntu USN |
USN-5201-1 | Python vulnerabilities |
Ubuntu USN |
USN-6891-1 | Python vulnerabilities |
Wed, 17 Dec 2025 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 03 Nov 2025 22:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Subscriptions
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2025-12-17T21:32:47.732Z
Reserved: 2021-08-26T00:00:00.000Z
Link: CVE-2021-3737
Updated: 2025-11-03T21:45:09.305Z
Status : Modified
Published: 2022-03-04T19:15:08.730
Modified: 2025-12-17T22:15:56.970
Link: CVE-2021-3737
OpenCVE Enrichment
No data.
Debian DLA
EUVD
Ubuntu USN