Resource Management Errors Affecting python2.7 package, versions <2.7.5-5
Snyk CVSS
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-DEBIAN9-PYTHON27-306524
- published 9 Oct 2013
- disclosed 9 Oct 2013
Introduced: 9 Oct 2013
CVE-2013-2099 Open this link in a new tabHow to fix?
Upgrade Debian:9
python2.7
to version 2.7.5-5 or higher.
NVD Description
Note: Versions mentioned in the description apply only to the upstream python2.7
package and not the python2.7
package as distributed by Debian
.
See How to fix?
for Debian:9
relevant fixed versions and status.
Algorithmic complexity vulnerability in the ssl.match_hostname function in Python 3.2.x, 3.3.x, and earlier, and unspecified versions of python-backports-ssl_match_hostname as used for older Python versions, allows remote attackers to cause a denial of service (CPU consumption) via multiple wildcard characters in the common name in a certificate.
References
- ADVISORY
- http://bugs.python.org/issue17980
- OSS security Advisory
- RedHat Bugzilla Bug
- RedHat Security Advisory
- RHSA Security Advisory
- Secunia Advisory
- Secunia Advisory
- Ubuntu CVE Tracker
- Ubuntu Security Advisory
- Ubuntu Security Advisory
- Ubuntu Security Advisory
- secalert@redhat.com
- secalert@redhat.com
- secalert@redhat.com
- secalert@redhat.com
- secalert@redhat.com