diff options
-rw-r--r-- | security/vuxml/vuln.xml | 31 |
1 files changed, 31 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index 7f30d5b1ef3c..8f7dfa073ecd 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -58,6 +58,37 @@ Notes: * Do not forget port variants (linux-f10-libxml2, libxml2, etc.) --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="d74371d2-4fee-11e9-a5cd-1df8a848de3d"> + <topic>Python -- NULL pointer dereference vulnerability</topic> + <affects> + <package> + <name>python37</name> + <range><lt>3.7.3</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>Python Changelog:</p> + <blockquote cite="https://docs.python.org/3.7/whatsnew/changelog.html"> + <p>bpo-35746: [CVE-2019-5010] Fix a NULL pointer deref in ssl module. The + cert parser did not handle CRL distribution points with empty DP or URI + correctly. A malicious or buggy certificate can result into segfault. + Vulnerability (TALOS-2018-0758) reported by Colin Read and Nicolas Edet + of Cisco.</p> + </blockquote> + </body> + </description> + <references> + <url>https://docs.python.org/3.7/whatsnew/changelog.html</url> + <url>https://bugs.python.org/issue35746</url> + <cvename>CVE-2019-5010</cvename> + </references> + <dates> + <discovery>2019-01-15</discovery> + <entry>2019-03-26</entry> + </dates> + </vuln> + <vuln vid="15ee0e93-4bbb-11e9-9ba0-4c72b94353b5"> <topic>wordpress -- multiple issues</topic> <affects> |