From red hat bugzilla at $URL: A man-in-the-middle vulnerability was reported [1] in Apache Libcloud, due to an invalid regular expression used to validate the target server hostname. When establishing an SSL/TLS connection to a target server, a subset of the full target server hostname was marked as an acceptable match for the given hostname (such as a certificate specifying "aexample.com" being considered acceptable for "example.com"). Upstream version 0.11.1 includes a fix for this flaw. [1] http://seclists.org/fulldisclosure/2012/Aug/55
dev-python/libcloud-0.11.1 has been added to the tree, and all older versions have been removed.
THanks
CVE-2012-3446 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3446): Apache Libcloud before 0.11.1 uses an incorrect regular expression during verification of whether the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via a crafted certificate.