From: Victor Stinner Date: Fri, 15 Feb 2019 12:19:30 +0000 (+0100) Subject: bpo-35746: Credit Colin Read and Nicolas Edet (GH-11864) X-Git-Tag: v3.7.3rc1~78 X-Git-Url: http://git.ipfire.org/?a=commitdiff_plain;h=fe42122d41834746e841b5927154be041fb7afbb;p=thirdparty%2FPython%2Fcpython.git bpo-35746: Credit Colin Read and Nicolas Edet (GH-11864) Add credit for the cert parser vulnerability. Mention also Cisco TALOS-2018-0758 identifier. --- diff --git a/Misc/NEWS.d/next/Security/2019-01-15-18-16-05.bpo-35746.nMSd0j.rst b/Misc/NEWS.d/next/Security/2019-01-15-18-16-05.bpo-35746.nMSd0j.rst index dffe347eec84..fc703b9c2469 100644 --- a/Misc/NEWS.d/next/Security/2019-01-15-18-16-05.bpo-35746.nMSd0j.rst +++ b/Misc/NEWS.d/next/Security/2019-01-15-18-16-05.bpo-35746.nMSd0j.rst @@ -1,3 +1,4 @@ [CVE-2019-5010] Fix a NULL pointer deref in ssl module. The cert parser did not handle CRL distribution points with empty DP or URI correctly. A -malicious or buggy certificate can result into segfault. +malicious or buggy certificate can result into segfault. Vulnerability +(TALOS-2018-0758) reported by Colin Read and Nicolas Edet of Cisco.