First published: Fri Sep 21 2018(Updated: )
A flaw was found in python's _elementtree.c module, a wrapper for libexpat XML parser. xml.etree C accelerator don't call XML_SetHashSalt(), failing to properly initiate the random hash seed from a good CSPRNG source and making hash collision attacks with carefully crafted XML data easier. Upstream bug: <a href="https://bugs.python.org/issue34623">https://bugs.python.org/issue34623</a>.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Python Python | >=2.7.0<=2.7.15 | |
Python Python | >=3.4.0<=3.4.9 | |
Python Python | >=3.5.0<=3.5.6 | |
Python Python | >=3.6.0<=3.6.6 | |
Python Python | =3.7.0 | |
Canonical Ubuntu Linux | =12.04 | |
Canonical Ubuntu Linux | =14.04 | |
Canonical Ubuntu Linux | =16.04 | |
Canonical Ubuntu Linux | =18.04 | |
Debian Debian Linux | =8.0 | |
Debian Debian Linux | =9.0 | |
Fedoraproject Fedora | =30 | |
openSUSE Leap | =15.1 | |
Redhat Enterprise Linux Desktop | =7.0 | |
Redhat Enterprise Linux Server | =7.0 | |
Redhat Enterprise Linux Workstation | =7.0 | |
redhat/python | <3.7.1 | 3.7.1 |
redhat/python | <3.6.7 | 3.6.7 |
redhat/python | <2.7.16 | 2.7.16 |
debian/python2.7 | 2.7.18-8+deb11u1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.