A null pointer dereference vulnerability was found in the certificate parsing code in Python. This causes a denial of service to applications when parsing specially crafted certificates. This vulnerability is unlikely to be triggered if application enables SSL/TLS certificate validation and accepts certificates only from trusted root certificate authorities.
An exploitable denial-of-service vulnerability exists in the X509 certificate parser of Python.org Python 2.7.11 / 3.7.2. A specially crafted X509 certificate can cause a NULL pointer dereference, resulting in a denial of service. An attacker can initiate or accept TLS connections using crafted certificates to trigger this vulnerability.
Created python3 tracking bugs for this issue:
Affects: fedora-all [bug 1666522]
Created python33 tracking bugs for this issue:
Affects: fedora-28 [bug 1666524]
Created python34 tracking bugs for this issue:
Affects: epel-all [bug 1666526]
Affects: fedora-all [bug 1666525]
Created python35 tracking bugs for this issue:
Affects: fedora-all [bug 1666527]
Created python36 tracking bugs for this issue:
Affects: epel-7 [bug 1666523]
Affects: fedora-29 [bug 1666520]
Created python37 tracking bugs for this issue:
Affects: fedora-28 [bug 1666521]
This issue did not affect the versions of python as shipped with Red Hat Enterprise Linux 5 and 6.