{"schema_version":"1.7.2","id":"OESA-2026-2368","modified":"2026-05-22T13:17:06Z","published":"2026-05-22T13:17:06Z","upstream":["CVE-2026-42304"],"summary":"python-twisted security update","details":"Twisted is an event-based framework for internet applications, supporting Python 2.7 and Python 3.5+. It includes modules for many different purposes, including the following:\r\n\r\nSecurity Fix(es):\n\nA denial of service vulnerability exists in Twisted framework when handling DNS compression pointer chains. A single malformed TCP packet is sufficient to block the Twisted reactor&apos;s event loop for several seconds. Because Twisted operates on a single-threaded cooperative multitasking model, this results in a common Denial of Service (DoS) attack. During this process, the server becomes unable to handle new connections, process I/O, or respond to existing requests, effectively paralyzing the server for the duration of decompression.(CVE-2026-42304)","affected":[{"package":{"ecosystem":"openEuler:22.03-LTS-SP4","name":"python-twisted","purl":"pkg:rpm/openEuler/python-twisted&distro=openEuler-22.03-LTS-SP4"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"22.4.0-5.oe2203sp4"}]}],"ecosystem_specific":{"aarch64":["python3-twisted-22.4.0-5.oe2203sp4.aarch64.rpm"],"noarch":["python-twisted-help-22.4.0-5.oe2203sp4.noarch.rpm"],"src":["python-twisted-22.4.0-5.oe2203sp4.src.rpm"],"x86_64":["python3-twisted-22.4.0-5.oe2203sp4.x86_64.rpm"]}}],"references":[{"type":"ADVISORY","url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2026-2368"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-42304"}],"database_specific":{"severity":"High"}}
