Sicherheit: Denial of Service in python-backports-ssl_match_hostname
Aktuelle Meldungen Distributionen
Name: Denial of Service in python-backports-ssl_match_hostname
ID: FEDORA-2013-8737
Distribution: Fedora
Plattformen: Fedora 17
Datum: Do, 30. Mai 2013, 10:36
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2098
Applikationen: python-backports-ssl_match_hostname


Name        : python-backports-ssl_match_hostname
Product : Fedora 17
Version : 3.2
Release : 0.3.a3.fc17
URL : https://bitbucket.org/brandon/backports.ssl_match_hostname
Summary : The ssl.match_hostname() function from Python 3.2
Description :
The Secure Sockets layer is only actually secure if you check the hostname in
the certificate returned by the server to which you are connecting, and verify
that it matches to hostname that you are trying to reach.

But the matching logic, defined in RFC2818, can be a bit tricky to implement on
your own. So the ssl package in the Standard Library of Python 3.2 now includes
a match_hostname() function for performing this check instead of requiring
every application to implement the check separately.

This backport brings match_hostname() to users of earlier versions of Python.
The actual code inside comes verbatim from Python 3.2.

Update Information:

Fixes CVE-2013-2098 -- Denial of Service with SSL certificates which have
specially crafted wildcard patterns.

[ 1 ] Bug #963186 - python-backports-ssl_match_hostname: Denial of service
when matching certificate with many '*' wildcard characters

This update can be installed with the "yum" update program. Use
su -c 'yum update python-backports-ssl_match_hostname' at the command
For more information, refer to "Managing Software with yum",
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
package-announce mailing list
Pro-Linux @Facebook
Neue Nachrichten