Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <1329233831.27728.3.camel@surprise>
Date: Tue, 14 Feb 2012 10:37:09 -0500
From: David Malcolm <dmalcolm@...hat.com>
To: oss-security@...ts.openwall.com
Cc: Kurt Seifried <kseifried@...hat.com>,
        "Steven M. Christey"
	 <coley@...us.mitre.org>,
        Daniel Callaghan <dcallagh@...hat.com>
Subject: Re: CVE Request -- python (SimpleXMLRPCServer): DoS
 (excessive CPU usage) via malformed XML-RPC / HTTP POST request

On Tue, 2012-02-14 at 12:13 +0100, Jan Lieskovsky wrote:
> Hello vendors,
> 
>    just FYI, this issue affected also upstream
> PyPy v1.6 and v1.8 versions. Relevant upstream bug
> being here:
> https://bugs.pypy.org/issue1047
...and almost certainly 1.7 also, probably earlier versions also: 1.6
and 1.8 were the only versions I had to hand and checked.

[PyPy embeds a copy of CPython's standard library, which it mostly uses
as is, overriding a few things here and there]


Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.