Python Cryptographic Authority pyopenssl version Before 17.5.0 contains a CWE - 401 : Failure to Release Memory Before Removing Last Reference vulnerability in PKCS #12 Store that can result in Denial of service if memory runs low or is exhausted. This attack appear to be exploitable via Depends upon calling application, however it could be as simple as initiating a TLS connection. Anything that would cause the calling application to reload certificates from a PKCS #12 store.. This vulnerability appears to have been fixed in 17.5.0.
References
Link | Resource |
---|---|
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00014.html | |
https://access.redhat.com/errata/RHSA-2019:0085 | Third Party Advisory |
https://github.com/pyca/pyopenssl/pull/723 | Patch Third Party Advisory |
https://usn.ubuntu.com/3813-1/ | Third Party Advisory |
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00014.html | |
https://access.redhat.com/errata/RHSA-2019:0085 | Third Party Advisory |
https://github.com/pyca/pyopenssl/pull/723 | Patch Third Party Advisory |
https://usn.ubuntu.com/3813-1/ | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
History
21 Nov 2024, 03:40
Type | Values Removed | Values Added |
---|---|---|
References | () http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00014.html - | |
References | () https://access.redhat.com/errata/RHSA-2019:0085 - Third Party Advisory | |
References | () https://github.com/pyca/pyopenssl/pull/723 - Patch, Third Party Advisory | |
References | () https://usn.ubuntu.com/3813-1/ - Third Party Advisory |
Information
Published : 2018-10-08 15:29
Updated : 2024-11-21 03:40
NVD link : CVE-2018-1000808
Mitre link : CVE-2018-1000808
CVE.ORG link : CVE-2018-1000808
JSON object : View
Products Affected
redhat
- enterprise_linux_server
- openstack
- enterprise_linux_desktop
- gluster_storage
- enterprise_linux_workstation
canonical
- ubuntu_linux
pyopenssl_project
- pyopenssl
CWE
CWE-404
Improper Resource Shutdown or Release