Skip to content

Commit 224d94e

Browse files
miss-islingtongpshead
authored andcommitted
00394: CVE-2022-45061: CPU denial of service via inefficient IDNA decoder
pythongh-98433: Fix quadratic time idna decoding. There was an unnecessary quadratic loop in idna decoding. This restores the behavior to linear. (cherry picked from commit a6f6c3a) Co-authored-by: Miss Islington (bot) <[email protected]> Co-authored-by: Gregory P. Smith <[email protected]>
1 parent 8667817 commit 224d94e

File tree

3 files changed

+27
-17
lines changed

3 files changed

+27
-17
lines changed

Lib/encodings/idna.py

+15-17
Original file line numberDiff line numberDiff line change
@@ -39,23 +39,21 @@ def nameprep(label):
3939

4040
# Check bidi
4141
RandAL = [stringprep.in_table_d1(x) for x in label]
42-
for c in RandAL:
43-
if c:
44-
# There is a RandAL char in the string. Must perform further
45-
# tests:
46-
# 1) The characters in section 5.8 MUST be prohibited.
47-
# This is table C.8, which was already checked
48-
# 2) If a string contains any RandALCat character, the string
49-
# MUST NOT contain any LCat character.
50-
if any(stringprep.in_table_d2(x) for x in label):
51-
raise UnicodeError("Violation of BIDI requirement 2")
52-
53-
# 3) If a string contains any RandALCat character, a
54-
# RandALCat character MUST be the first character of the
55-
# string, and a RandALCat character MUST be the last
56-
# character of the string.
57-
if not RandAL[0] or not RandAL[-1]:
58-
raise UnicodeError("Violation of BIDI requirement 3")
42+
if any(RandAL):
43+
# There is a RandAL char in the string. Must perform further
44+
# tests:
45+
# 1) The characters in section 5.8 MUST be prohibited.
46+
# This is table C.8, which was already checked
47+
# 2) If a string contains any RandALCat character, the string
48+
# MUST NOT contain any LCat character.
49+
if any(stringprep.in_table_d2(x) for x in label):
50+
raise UnicodeError("Violation of BIDI requirement 2")
51+
# 3) If a string contains any RandALCat character, a
52+
# RandALCat character MUST be the first character of the
53+
# string, and a RandALCat character MUST be the last
54+
# character of the string.
55+
if not RandAL[0] or not RandAL[-1]:
56+
raise UnicodeError("Violation of BIDI requirement 3")
5957

6058
return label
6159

Lib/test/test_codecs.py

+6
Original file line numberDiff line numberDiff line change
@@ -1640,6 +1640,12 @@ def test_builtin_encode(self):
16401640
self.assertEqual("pyth\xf6n.org".encode("idna"), b"xn--pythn-mua.org")
16411641
self.assertEqual("pyth\xf6n.org.".encode("idna"), b"xn--pythn-mua.org.")
16421642

1643+
def test_builtin_decode_length_limit(self):
1644+
with self.assertRaisesRegex(UnicodeError, "too long"):
1645+
(b"xn--016c"+b"a"*1100).decode("idna")
1646+
with self.assertRaisesRegex(UnicodeError, "too long"):
1647+
(b"xn--016c"+b"a"*70).decode("idna")
1648+
16431649
def test_stream(self):
16441650
r = codecs.getreader("idna")(io.BytesIO(b"abc"))
16451651
r.read(3)
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,6 @@
1+
The IDNA codec decoder used on DNS hostnames by :mod:`socket` or :mod:`asyncio`
2+
related name resolution functions no longer involves a quadratic algorithm.
3+
This prevents a potential CPU denial of service if an out-of-spec excessive
4+
length hostname involving bidirectional characters were decoded. Some protocols
5+
such as :mod:`urllib` http ``3xx`` redirects potentially allow for an attacker
6+
to supply such a name.

0 commit comments

Comments
 (0)