Bug 1161650 (CVE-2014-8650) - CVE-2014-8650 python-requests-kerberos: improper handling of mutual authentication
Summary: CVE-2014-8650 python-requests-kerberos: improper handling of mutual authentic...
Alias: CVE-2014-8650
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
Depends On: 1160545 1160546 1161651 1161652
TreeView+ depends on / blocked
Reported: 2014-11-07 14:51 UTC by Vasyl Kaigorodov
Modified: 2019-09-29 13:23 UTC (History)
0 users

Fixed In Version: requests-kerberos 0.6
Doc Type: Bug Fix
Doc Text:
Clone Of:
Last Closed: 2019-06-08 02:35:45 UTC

Attachments (Terms of Use)

Description Vasyl Kaigorodov 2014-11-07 14:51:24 UTC

    A fix was merged and released today for the package which performs
    kerberos authentication when using python-requests. Prior to this,
    every version of the package did not properly handle mutual
    authentication which means that the client did not verify that the
    user was communicating with a trusted server. The version which
    contains the fix is 0.6 and all prior versions are considered

    This bug, however, prevented the mutual authentication code from being
    executed, so it's possible that users think they're talking to a
    trusted server, but they're not.


    Make certain that responses always pass through handle_other() to provide mutual
    authentication before returning them to the user.

    0.6: 2014-11-04
    Handle mutual authentication (see pull request 36)

Comment 1 Vasyl Kaigorodov 2014-11-07 14:51:51 UTC
Created python-requests-kerberos tracking bugs for this issue:

Affects: fedora-all [bug 1161651]
Affects: epel-all [bug 1161652]

Comment 2 Dan Callaghan 2014-11-09 23:41:42 UTC
This is a dupe of bug 1160540. I guess you just want to set the CVE ID on that other bug so your scripts find it properly.

Comment 3 Product Security DevOps Team 2019-06-08 02:35:45 UTC
This CVE Bugzilla entry is for community support informational purposes only as it does not affect a package in a commercially supported Red Hat product. Refer to the dependent bugs for status of those individual community products.

Note You need to log in before you can comment on or make changes to this bug.