Bug 963186
Summary: | python-backports-ssl_match_hostname: Denial of service when matching certificate with many '*' wildcard characters | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Jan Lieskovsky <jlieskov> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED DUPLICATE | QA Contact: | |
Severity: | low | Docs Contact: | |
Priority: | low | ||
Version: | unspecified | CC: | fweimer, ian |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | Bug Fix | |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | 2013-05-15 14:50:18 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: |
Description
Jan Lieskovsky
2013-05-15 11:02:05 UTC
This issue affects the versions of the python-backports-ssl_match_hostname package as shipped with Fedora release of 17, 18, and Fedora EPEL-6. Please schedule an update (once there is final upstream patch available). Created python-backports-ssl_match_hostname tracking bugs for this issue Affects: fedora-all [bug 963187] Affects: epel-6 [bug 963188] CVE request: http://www.openwall.com/lists/oss-security/2013/05/15/6 and Python 3.2 case follow-up: http://www.openwall.com/lists/oss-security/2013/05/15/7 (will file independent Python 3.2 bug shortly - after the lunch) *** This bug has been marked as a duplicate of bug 963260 *** |