First published: Fri Sep 21 2018(Updated: )
A flaw was found in python's _elementtree.c module, a wrapper for libexpat XML parser. xml.etree C accelerator don't call XML_SetHashSalt(), failing to properly initiate the random hash seed from a good CSPRNG source and making hash collision attacks with carefully crafted XML data easier. Upstream bug: <a href="https://bugs.python.org/issue34623">https://bugs.python.org/issue34623</a>.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/python | <3.7.1 | 3.7.1 |
redhat/python | <3.6.7 | 3.6.7 |
redhat/python | <2.7.16 | 2.7.16 |
debian/python2.7 | 2.7.18-8+deb11u1 | |
Python Programming Language | >=2.7.0<=2.7.15 | |
Python Programming Language | >=3.4.0<=3.4.9 | |
Python Programming Language | >=3.5.0<=3.5.6 | |
Python Programming Language | >=3.6.0<=3.6.6 | |
Python Programming Language | =3.7.0 | |
Ubuntu Linux | =12.04 | |
Ubuntu Linux | =14.04 | |
Ubuntu Linux | =16.04 | |
Ubuntu Linux | =18.04 | |
Debian Debian Linux | =8.0 | |
Debian Debian Linux | =9.0 | |
Fedoraproject Fedora | =30 | |
openSUSE | =15.1 | |
redhat enterprise Linux desktop | =7.0 | |
redhat enterprise Linux server | =7.0 | |
redhat enterprise Linux workstation | =7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-14647 is classified as a medium severity vulnerability due to its potential for hash collision attacks.
To address CVE-2018-14647, update your Python installation to version 3.7.1, 3.6.7, or 2.7.16 depending on your environment.
CVE-2018-14647 affects Python versions prior to 2.7.16, 3.6.7, and 3.7.1.
CVE-2018-14647 can lead to hash collision vulnerabilities when processing XML due to improper initialization of the random hash seed.
CVE-2018-14647 is not specific to any operating system but affects Python across multiple distributions including Red Hat and Debian.