From: Victor Stinner Date: Sat, 16 Feb 2019 07:23:52 +0000 (+0100) Subject: bpo-35746: Credit Colin Read and Nicolas Edet (GH-11865) X-Git-Tag: v3.6.9rc1~24 X-Git-Url: http://git.ipfire.org/gitweb.cgi?a=commitdiff_plain;h=2a3af94b7e4d7851986043348128e312ddbb2451;p=thirdparty%2FPython%2Fcpython.git bpo-35746: Credit Colin Read and Nicolas Edet (GH-11865) Add credit for the cert parser vulnerability. Mention also Cisco TALOS-2018-0758 identifier. --- diff --git a/Misc/NEWS.d/next/Security/2019-01-15-18-16-05.bpo-35746.nMSd0j.rst b/Misc/NEWS.d/next/Security/2019-01-15-18-16-05.bpo-35746.nMSd0j.rst index dffe347eec84..fc703b9c2469 100644 --- a/Misc/NEWS.d/next/Security/2019-01-15-18-16-05.bpo-35746.nMSd0j.rst +++ b/Misc/NEWS.d/next/Security/2019-01-15-18-16-05.bpo-35746.nMSd0j.rst @@ -1,3 +1,4 @@ [CVE-2019-5010] Fix a NULL pointer deref in ssl module. The cert parser did not handle CRL distribution points with empty DP or URI correctly. A -malicious or buggy certificate can result into segfault. +malicious or buggy certificate can result into segfault. Vulnerability +(TALOS-2018-0758) reported by Colin Read and Nicolas Edet of Cisco.