First published: Wed Jul 08 2020(Updated: )
A vulnerability was found in Lib/ipaddress.py in Python through 3.8.3 improperly computes hash values in the IPv4Interface and IPv6Interface classes, which might allow a remote attacker to cause a denial of service if an application is affected by the performance of a dictionary containing IPv4Interface or IPv6Interface objects, and this attacker can cause many dictionary entries to be created. References: <a href="https://bugs.python.org/issue41004">https://bugs.python.org/issue41004</a> <a href="https://github.com/python/cpython/pull/20956">https://github.com/python/cpython/pull/20956</a>
Affected Software | Affected Version | How to fix |
---|---|---|
Python Babel Localedata | <=3.8.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1854926 is classified as high due to its potential for causing a denial of service.
To fix REDHAT-BUG-1854926, upgrade Python to version 3.8.4 or later where the vulnerability has been resolved.
REDHAT-BUG-1854926 can negatively affect applications by causing degraded performance and possible denial of service when handling IPv4Interface and IPv6Interface classes.
REDHAT-BUG-1854926 affects Python versions up to and including 3.8.3.
Any application that uses the affected Python version for processing IP addresses may be vulnerable to REDHAT-BUG-1854926.