<?xml version="1.0" encoding="UTF-8" ?>

<bugzilla version="5.2"
          urlbase="https://bugzilla.altlinux.org/"
          
          maintainer="jenya@basealt.ru"
>

    <bug>
          <bug_id>24469</bug_id>
          
          <creation_ts>2010-11-01 10:27:54 +0300</creation_ts>
          <short_desc>CVE-2010-3493: smtpd module denial of service vulnerabilities</short_desc>
          <delta_ts>2015-11-13 09:26:49 +0300</delta_ts>
          <reporter_accessible>1</reporter_accessible>
          <cclist_accessible>1</cclist_accessible>
          <classification_id>4</classification_id>
          <classification>Development</classification>
          <product>Sisyphus</product>
          <component>python-modules</component>
          <version>unstable</version>
          <rep_platform>all</rep_platform>
          <op_sys>Linux</op_sys>
          <bug_status>CLOSED</bug_status>
          <resolution>FIXED</resolution>
          
          
          <bug_file_loc>http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3493</bug_file_loc>
          <status_whiteboard></status_whiteboard>
          <keywords>security</keywords>
          <priority>P3</priority>
          <bug_severity>blocker</bug_severity>
          <target_milestone>---</target_milestone>
          
          
          <everconfirmed>1</everconfirmed>
          <reporter name="Vladimir Lettiev">crux</reporter>
          <assigned_to name="Nobody&apos;s working on this, feel free to take it">nobody</assigned_to>
          <cc>cow</cc>
    
    <cc>evg</cc>
    
    <cc>george</cc>
    
    <cc>glebfm</cc>
    
    <cc>imz</cc>
    
    <cc>real.altlinux.org</cc>
          
          <qa_contact>qa-sisyphus</qa_contact>

      

      

      

          <comment_sort_order>oldest_to_newest</comment_sort_order>  
          <long_desc isprivate="0" >
    <commentid>114657</commentid>
    <comment_count>0</comment_count>
    <who name="Vladimir Lettiev">crux</who>
    <bug_when>2010-11-01 10:27:54 +0300</bug_when>
    <thetext>Multiple race conditions in smtpd.py in the smtpd module in Python 2.6, 2.7, 3.1, and 3.2 alpha allow remote attackers to cause a denial of service (daemon outage) by establishing and then immediately closing a TCP connection, leading to the accept function having an unexpected return value of None, an unexpected value of None for the address, or an ECONNABORTED, EAGAIN, or EWOULDBLOCK error, or the getpeername function having an ENOTCONN error

fixed in r84289: http://svn.python.org/view?rev=84289&amp;view=rev (not yet backported to 2.6)</thetext>
  </long_desc><long_desc isprivate="0" >
    <commentid>119504</commentid>
    <comment_count>1</comment_count>
    <who name="real@altlinux.org">real.altlinux.org</who>
    <bug_when>2011-03-26 19:22:34 +0300</bug_when>
    <thetext>&quot;not yet backported to 2.6&quot;

А когда и где будет?</thetext>
  </long_desc><long_desc isprivate="0" >
    <commentid>153676</commentid>
    <comment_count>2</comment_count>
    <who name="Evgenii Terechkov">evg</who>
    <bug_when>2015-11-13 09:26:41 +0300</bug_when>
    <thetext>Я так понимаю, в 2.7 уже починено.</thetext>
  </long_desc>
      
      

    </bug>

</bugzilla>