CVE Vulnerabilities

CVE-2022-40897

Inefficient Regular Expression Complexity

Published: Dec 23, 2022 | Modified: Nov 04, 2025
CVSS 3.x
5.9
MEDIUM
Source:
NVD
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
CVSS 2.x
RedHat/V2
RedHat/V3
5.9 MODERATE
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

Python Packaging Authority (PyPA) setuptools before 65.5.1 allows remote attackers to cause a denial of service via HTML in a crafted package or custom PackageIndex page. There is a Regular Expression Denial of Service (ReDoS) in package_index.py.

Weakness

The product uses a regular expression with an inefficient, possibly exponential worst-case computational complexity that consumes excessive CPU cycles.

Affected Software

NameVendorStart VersionEnd Version
SetuptoolsPython*65.5.1 (excluding)
Red Hat Enterprise Linux 8RedHatpython39:3.9-8100020240214182535.7044f6c1*
Red Hat Enterprise Linux 8RedHatpython39-devel:3.9-8100020240214182535.7044f6c1*
Red Hat Enterprise Linux 8RedHatpython27:2.7-8100020240208011952.5f0f67de*
Red Hat Enterprise Linux 8RedHatpython-setuptools-0:39.2.0-6.el8_7.1*
Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update SupportRedHatpython39:3.9-8060020240916062113.6a631399*
Red Hat Enterprise Linux 8.6 Extended Update SupportRedHatpython-setuptools-0:39.2.0-7.el8_6*
Red Hat Enterprise Linux 8.6 Telecommunications Update ServiceRedHatpython39:3.9-8060020240916062113.6a631399*
Red Hat Enterprise Linux 8.6 Update Services for SAP SolutionsRedHatpython39:3.9-8060020240916062113.6a631399*
Red Hat Enterprise Linux 8.8 Extended Update SupportRedHatpython39:3.9-8080020240402104641.93c2fc2f*
Red Hat Enterprise Linux 8.8 Extended Update SupportRedHatpython39-devel:3.9-8080020240402104641.93c2fc2f*
Red Hat Enterprise Linux 9RedHatpython-setuptools-0:53.0.0-10.el9_1.1*
Red Hat Software Collections for Red Hat Enterprise Linux 7RedHatrh-python38-python-setuptools-0:41.6.0-8.el7*
Python-pipUbuntubionic*
Python-pipUbuntuesm-apps/bionic*
Python-pipUbuntuesm-apps/focal*
Python-pipUbuntuesm-apps/jammy*
Python-pipUbuntuesm-apps/xenial*
Python-pipUbuntuesm-infra-legacy/trusty*
Python-pipUbuntufocal*
Python-pipUbuntujammy*
Python-pipUbuntukinetic*
Python-pipUbuntutrusty*
Python-pipUbuntutrusty/esm*
Python-pipUbuntuupstream*
Python-pipUbuntuxenial*
Python-setuptoolsUbuntubionic*
Python-setuptoolsUbuntuesm-apps/focal*
Python-setuptoolsUbuntuesm-apps/jammy*
Python-setuptoolsUbuntuesm-infra-legacy/trusty*
Python-setuptoolsUbuntuesm-infra/bionic*
Python-setuptoolsUbuntuesm-infra/xenial*
Python-setuptoolsUbuntufocal*
Python-setuptoolsUbuntujammy*
Python-setuptoolsUbuntukinetic*
Python-setuptoolsUbuntutrusty*
Python-setuptoolsUbuntutrusty/esm*
Python-setuptoolsUbuntuupstream*
Python-setuptoolsUbuntuxenial*
SetuptoolsUbuntuesm-infra/focal*
SetuptoolsUbuntufocal*
SetuptoolsUbuntujammy*
SetuptoolsUbuntukinetic*
SetuptoolsUbuntuupstream*

Extended Description

	  Attackers can create crafted inputs that
	  intentionally cause the regular expression to use
	  excessive backtracking in a way that causes the CPU
	  consumption to spike.

Potential Mitigations

References