CVE-2022-45061
NixOS vulnerability analysis and mitigation

Overview

An issue was discovered in Python before version 3.11.1 affecting the IDNA (RFC 3490) decoder implementation. The vulnerability was identified with CVE identifier CVE-2022-45061 and affects all Python versions prior to 3.11.1, 3.10.9, 3.9.16, 3.8.16, and 3.7.16. The vulnerability exists in the processing path of the IDNA decoder, which contains an unnecessary quadratic algorithm (CVE MITRE, NVD).

Technical details

The vulnerability stems from an inefficient implementation in the IDNA decoder where processing certain inputs triggers a quadratic time complexity algorithm. When presented with crafted, unreasonably long hostnames, the decoder's processing time increases quadratically with input size. For example, execution times vary significantly: 10 chars = 0.016 seconds, 100 chars = 0.047 seconds, 1000 chars = 2.883 seconds, 2500 chars = 17.724 seconds, and 5000 chars = 1 minute 10 seconds (GitHub Issue).

Impact

The vulnerability can lead to a CPU-based denial of service (DoS) condition. Since hostnames are often supplied by remote servers that could be controlled by malicious actors, they could trigger excessive CPU consumption on clients attempting to process attacker-supplied hostnames. A practical attack vector involves placing the payload in the Location header of an HTTP response with status code 302 (CVE MITRE).

Mitigation and workarounds

The primary mitigation is to upgrade to fixed versions of Python: 3.11.1, 3.10.9, 3.9.16, 3.8.16, or 3.7.16. Various distributions have released security updates addressing this vulnerability, including Fedora, Debian, and Ubuntu. For systems that cannot be immediately updated, there are no documented workarounds, making the upgrade to a patched version the only effective solution (Debian Security).

Additional resources


SourceThis report was generated using AI

Related NixOS vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-14330CRITICAL9.8
  • NixOSNixOS
  • cpe:2.3:a:mozilla:firefox_esr
NoYesDec 09, 2025
CVE-2025-14329HIGH8.8
  • NixOSNixOS
  • cpe:2.3:a:mozilla:firefox:*:*:*:*:esr:*:*:*
NoYesDec 09, 2025
CVE-2025-14333HIGH8.1
  • NixOSNixOS
  • firefox
NoYesDec 09, 2025
CVE-2025-14332HIGH7.3
  • NixOSNixOS
  • firefox
NoYesDec 09, 2025
CVE-2025-14331MEDIUM6.5
  • NixOSNixOS
  • firefox
NoYesDec 09, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management