Algorithmic complexity vulnerability in the ssl.matchhostname function in Python 3.2.x, 3.3.x, and earlier, and unspecified versions of python-backports-sslmatch_hostname as used for older Python versions, allows remote attackers to cause a denial of service (CPU consumption) via multiple wildcard characters in the common name in a certificate.
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "binary_version": "2.18-2.1build2", "binary_name": "0install" }, { "binary_version": "2.18-2.1build2", "binary_name": "0install-core" }, { "binary_version": "2.18-2.1build2", "binary_name": "0install-core-dbgsym" }, { "binary_version": "2.18-2.1build2", "binary_name": "0install-dbgsym" } ] }