security - Re: CVE Request: Python Hash DoS (Issue 13703) (original) (raw)

Openwall Products Openwall GNU/*/Linux server OS Linux Kernel Runtime Guard John the Ripper password cracker Free & Open Source for any platform in the cloud Pro for Linux Pro for macOS Wordlists for password cracking passwdqc policy enforcement Free & Open Source for Unix Pro for Windows (Active Directory) yescrypt KDF & password hashing yespower Proof-of-Work (PoW) crypt_blowfish password hashing phpass ditto in PHP tcb better password shadowing Pluggable Authentication Modules scanlogd port scan detector popa3d tiny POP3 daemon blists web interface to mailing lists msulogin single user mode login php_mt_seed mt_rand() cracker Services Publications Articles Presentations Resources Mailing lists Community wiki Source code repositories (GitHub) Source code repositories (CVSweb) File archive & mirrors How to verify digital signatures OVE IDs What's new

[<prev] [next>] [<thread-prev] [day] [month] [year] [list]

Message-ID: 4F5AEBF0.8020907@redhat.com Date: Fri, 09 Mar 2012 22:51:44 -0700 From: Kurt Seifried <kseifried@...hat.com> To: oss-security@...ts.openwall.com Subject: Re: CVE Request: Python Hash DoS (Issue 13703)

On 03/09/2012 10:48 PM, Kurt Seifried wrote:

Can I please get a CVE for the Python Hash DoS:

This is an offshoot of oCERT-2011-003

http://bugs.python.org/issue13703 https://bugzilla.redhat.com/show_bug.cgi?id=750555

Please use CVE-2012-1150 for this issue.

-- Kurt Seifried Red Hat Security Response Team (SRT)

Powered by blists - more mailing lists

Please check out theOpen Source Software Security Wiki, which is counterpart to thismailing list.

Confused about mailing lists and their use?Read about mailing lists on Wikipediaand check out theseguidelines on proper formatting of your messages.