| Summary: | python-OpenSSL - hostname check bypassing vulnerability (CVE-2013-4314) | ||
|---|---|---|---|
| Product: | Mageia | Reporter: | Oden Eriksson <oe> |
| Component: | Security | Assignee: | QA Team <qa-bugs> |
| Status: | RESOLVED FIXED | QA Contact: | Sec team <security> |
| Severity: | major | ||
| Priority: | Normal | CC: | davidwhodgins, luigiwalser, sysadmin-bugs |
| Version: | 3 | Keywords: | validated_update |
| Target Milestone: | --- | ||
| Hardware: | i586 | ||
| OS: | Linux | ||
| URL: | http://lwn.net/Vulnerabilities/566722/ | ||
| Whiteboard: | MGA2TOO MGA3-64-OK MGA3-32-OK MGA2-64-OK MGA2-32-OK has_procedure | ||
| Source RPM: | python-OpenSSL | CVE: | |
| Status comment: | |||
| Attachments: | Script for testing https connection. | ||
|
Description
Oden Eriksson
2013-09-09 17:21:48 CEST
python-OpenSSL-0.12-1.1.mga2, python-OpenSSL-0.13-2.1.mga3 and python-OpenSSL-0.13.1-1.mga4 has been submitted where this is fixed. Advisory: ======================== Updated python-OpenSSL package fixes security vulnerability: The string formatting of subjectAltName X509Extension instances in pyOpenSSL before 0.13.1 incorrectly truncated fields of the name when encountering a null byte, possibly allowing man-in-the-middle attacks through certificate spoofing (CVE-2013-4314). References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4314 https://mail.python.org/pipermail/pyopenssl-users/2013-September/000478.html https://bugzilla.redhat.com/show_bug.cgi?id=1005325 ======================== Updated packages in core/updates_testing: ======================== python-OpenSSL-0.12-1.1.mga2 python-OpenSSL-0.13-2.1.mga3 from SRPMS: python-OpenSSL-0.12-1.1.mga2.src.rpm python-OpenSSL-0.13-2.1.mga3.src.rpm Version:
2 =>
3 Testing complete m2 and m3, both arches. Advisory 11206.adv committed to svn. Someone from the sysadmin team please push 11206.adv to updates. Keywords:
(none) =>
validated_update Mandriva has issued an advisory for this today (September 13): http://www.mandriva.com/en/support/security/advisories/mbs1/MDVSA-2013:233/ URL:
http://www.openwall.com/lists/oss-security/2013/09/06/2 =>
http://lwn.net/Vulnerabilities/566722/ http://advisories.mageia.org/MGASA-2013-0277.html Status:
NEW =>
RESOLVED
Nicolas Vigier
2014-05-08 18:04:23 CEST
CC:
boklm =>
(none) |