This issue tracker has been migrated to GitHub, and is currently read-only.
For more information, see the GitHub FAQs in the Python's Developer Guide.

Author christian.heimes
Recipients bmw, christian.heimes, ned.deily, paul.moore, ronaldoussoren, steve.dower, tim.golden, zach.ware
Date 2021-03-29.20:55:15
SpamBayes Score -1.0
Marked as misclassified Yes
Message-id <1617051315.63.0.696821487705.issue43631@roundup.psfhosted.org>
In-reply-to
Content
Thanks!

My mail https://mail.python.org/archives/list/python-dev@python.org/thread/2GULUR43MNEW3IJM44LS5ZY2TOUANPNT/ contains a first analysis of the CVEs. I'm pretty sure any server application with server-side TLS socket is vulnerable to CVE-2021-3449.
History
Date User Action Args
2021-03-29 20:55:15christian.heimessetrecipients: + christian.heimes, paul.moore, ronaldoussoren, tim.golden, ned.deily, zach.ware, steve.dower, bmw
2021-03-29 20:55:15christian.heimessetmessageid: <1617051315.63.0.696821487705.issue43631@roundup.psfhosted.org>
2021-03-29 20:55:15christian.heimeslinkissue43631 messages
2021-03-29 20:55:15christian.heimescreate