|
Message-ID: <1329233831.27728.3.camel@surprise> Date: Tue, 14 Feb 2012 10:37:09 -0500 From: David Malcolm <dmalcolm@...hat.com> To: oss-security@...ts.openwall.com Cc: Kurt Seifried <kseifried@...hat.com>, "Steven M. Christey" <coley@...us.mitre.org>, Daniel Callaghan <dcallagh@...hat.com> Subject: Re: CVE Request -- python (SimpleXMLRPCServer): DoS (excessive CPU usage) via malformed XML-RPC / HTTP POST request On Tue, 2012-02-14 at 12:13 +0100, Jan Lieskovsky wrote: > Hello vendors, > > just FYI, this issue affected also upstream > PyPy v1.6 and v1.8 versions. Relevant upstream bug > being here: > https://bugs.pypy.org/issue1047 ...and almost certainly 1.7 also, probably earlier versions also: 1.6 and 1.8 were the only versions I had to hand and checked. [PyPy embeds a copy of CPython's standard library, which it mostly uses as is, overriding a few things here and there]
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.