Skip to content

Conversation

@renovate
Copy link
Contributor

@renovate renovate bot commented Apr 12, 2024

This PR contains the following updates:

Package Change Age Confidence
idna (changelog) ==2.10==3.7 age confidence

GitHub Vulnerability Alerts

CVE-2024-3651

Impact

A specially crafted argument to the idna.encode() function could consume significant resources. This may lead to a denial-of-service.

Patches

The function has been refined to reject such strings without the associated resource consumption in version 3.7.

Workarounds

Domain names cannot exceed 253 characters in length, if this length limit is enforced prior to passing the domain to the idna.encode() function it should no longer consume significant resources. This is triggered by arbitrarily large inputs that would not occur in normal usage, but may be passed to the library assuming there is no preliminary input validation by the higher-level application.

References


Release Notes

kjd/idna (idna)

v3.7

Compare Source

What's Changed

  • Fix issue where specially crafted inputs to encode() could take exceptionally long amount of time to process. [CVE-2024-3651]

Thanks to Guido Vranken for reporting the issue.

Full Changelog: kjd/idna@v3.6...v3.7

v3.6

Compare Source

v3.5

Compare Source

v3.4

Compare Source

v3.3

Compare Source

v3.2

Compare Source

v3.1

Compare Source

v3.0

Compare Source


Configuration

📅 Schedule: Branch creation - "" (UTC), Automerge - At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, check this box

This PR was generated by Mend Renovate. View the repository job log.

@renovate renovate bot changed the title Update dependency idna to v3 [SECURITY] Update dependency idna to v3 [SECURITY] - autoclosed Jun 24, 2024
@renovate renovate bot closed this Jun 24, 2024
@renovate renovate bot deleted the renovate/pypi-idna-vulnerability branch June 24, 2024 03:15
@renovate renovate bot restored the renovate/pypi-idna-vulnerability branch June 24, 2024 09:46
@renovate renovate bot changed the title Update dependency idna to v3 [SECURITY] - autoclosed Update dependency idna to v3 [SECURITY] Jun 24, 2024
@renovate renovate bot reopened this Jun 24, 2024
@renovate renovate bot force-pushed the renovate/pypi-idna-vulnerability branch from b232110 to b40a40f Compare June 24, 2024 09:47
@renovate renovate bot force-pushed the renovate/pypi-idna-vulnerability branch 4 times, most recently from 4558e8e to 8d7ac5d Compare December 3, 2025 11:22
@renovate renovate bot force-pushed the renovate/pypi-idna-vulnerability branch 2 times, most recently from 954028b to 2c74142 Compare January 12, 2026 10:36
@renovate renovate bot force-pushed the renovate/pypi-idna-vulnerability branch from 2c74142 to d3e9ce6 Compare January 13, 2026 16:44
@renovate renovate bot changed the title Update dependency idna to v3 [SECURITY] Update dependency idna to v3 [SECURITY] - autoclosed Jan 14, 2026
@renovate renovate bot closed this Jan 14, 2026
@renovate renovate bot deleted the renovate/pypi-idna-vulnerability branch January 14, 2026 08:28
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant