First published: Tue Aug 22 2023(Updated: )
Last updated 24 July 2024
Credit: cve@mitre.org cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Python Python | <3.7.7 | |
Python Python | >=3.8.0<3.8.2 | |
Python Python | >=3.9.0<3.9.1 | |
Python Python | =3.10.0-alpha1 | |
redhat/python | <3.10.0 | 3.10.0 |
redhat/python | <3.9.1 | 3.9.1 |
redhat/python | <3.8.7 | 3.8.7 |
redhat/python | <3.7.10 | 3.7.10 |
redhat/python | <3.6.13 | 3.6.13 |
Python Python | <3.6.13 | |
Python Python | >=3.7.0<3.7.10 | |
Python Python | >=3.8.0<3.8.7 | |
Netapp Active Iq Unified Manager Vmware Vsphere | ||
Netapp Active Iq Unified Manager Windows | ||
IBM QRadar SIEM | <=7.5 - 7.5.0 UP8 IF01 | |
debian/pypy3 | 7.3.5+dfsg-2+deb11u2 7.3.5+dfsg-2+deb11u3 7.3.11+dfsg-2+deb12u2 7.3.17+dfsg-2 | |
debian/python2.7 | 2.7.18-8+deb11u1 | |
debian/python3.9 | 3.9.2-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-48564 is a vulnerability in Python through 3.9.1 that can lead to a potential denial-of-service (DoS) attack via CPU and RAM exhaustion when processing malformed Apple Property List files in binary format.
CVE-2022-48564 affects Python versions up to and including 3.9.1.
The severity level of CVE-2022-48564 is medium with a CVSS score of 6.5.
To mitigate the impact of CVE-2022-48564, it is recommended to update Python to version 3.9.2 or later.
More information about CVE-2022-48564 can be found at the following references: [Link 1](https://bugs.python.org/issue42103), [Link 2](https://security.netapp.com/advisory/ntap-20230929-0009/).