SB2015100108 - Fedora EPEL 7 update for python-pymongo



SB2015100108 - Fedora EPEL 7 update for python-pymongo

Published: October 1, 2015 Updated: June 28, 2025

Security Bulletin ID SB2015100108
Severity
Medium
Patch available
YES
Number of vulnerabilities 2
Exploitation vector Remote access
Highest impact Data manipulation

Breakdown by Severity

Medium 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 2 secuirty vulnerabilities.


1) Data Handling (CVE-ID: CVE-2013-7440)

The vulnerability allows a remote non-authenticated attacker to manipulate data.

The ssl.match_hostname function in CPython (aka Python) before 2.7.9 and 3.x before 3.3.3 does not properly handle wildcards in hostnames, which might allow man-in-the-middle attackers to spoof servers via a crafted certificate.


2) Resource management error (CVE-ID: CVE-2013-2099)

The vulnerability allows a remote non-authenticated attacker to perform service disruption.

Algorithmic complexity vulnerability in the ssl.match_hostname function in Python 3.2.x, 3.3.x, and earlier, and unspecified versions of python-backports-ssl_match_hostname as used for older Python versions, allows remote attackers to cause a denial of service (CPU consumption) via multiple wildcard characters in the common name in a certificate.


Remediation

Install update from vendor's website.