First published: Mon Feb 26 2018(Updated: )
Catastrophic backtracking vulnerability was found in Python. Exploitation of a regular expression in pop3lib's apop() method although limited by 2048 chars, can lead to denial of service. Upstream issue: <a href="https://bugs.python.org/issue32981">https://bugs.python.org/issue32981</a>
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Python Python | >=2.7.0<2.7.15 | |
Python Python | >=3.0.0<3.4.9 | |
Python Python | >=3.5.0<3.5.6 | |
Python Python | >3.6.0<3.6.5 | |
Fedoraproject Fedora | =28 | |
Fedoraproject Fedora | =29 | |
Fedoraproject Fedora | =30 | |
Canonical Ubuntu Linux | =12.04 | |
Canonical Ubuntu Linux | =14.04 | |
Canonical Ubuntu Linux | =16.04 | |
Canonical Ubuntu Linux | =18.04 | |
Redhat Ansible Tower | =3.3 | |
Redhat Enterprise Linux Desktop | =7.0 | |
Redhat Enterprise Linux Server | =7.0 | |
Redhat Enterprise Linux Workstation | =7.0 | |
Debian Debian Linux | =8.0 | |
Debian Debian Linux | =9.0 | |
redhat/python | <2.7.15 | 2.7.15 |
redhat/python | <3.4.9 | 3.4.9 |
redhat/python | <3.5.6 | 3.5.6 |
redhat/python | <3.6.5 | 3.6.5 |
redhat/python | <3.7.0 | 3.7.0 |
debian/python2.7 | 2.7.18-8+deb11u1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.