An issue discovered in Python Charmers Future 0.18.2 and earlier allows remote attackers to cause a denial of service via crafted Set-Cookie header from malicious web server. References: https://pypi.org/project/future/ https://github.com/python/cpython/pull/17157 https://github.com/PythonCharmers/python-future/blob/master/src/future/backports/http/cookiejar.py#L215 https://pyup.io/posts/pyup-discovers-redos-vulnerabilities-in-top-python-packages/
This issue has been addressed in the following products: RHUI 4 for RHEL 8 Via RHSA-2023:2101 https://access.redhat.com/errata/RHSA-2023:2101
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2022-40899
This issue has been addressed in the following products: Red Hat Satellite 6.13 for RHEL 8 Via RHSA-2023:4466 https://access.redhat.com/errata/RHSA-2023:4466
This issue has been addressed in the following products: Red Hat Satellite 6.14 for RHEL 8 Via RHSA-2023:6818 https://access.redhat.com/errata/RHSA-2023:6818