Python's elementtree C accelerator failed to initialise Expat's hash salt during initialization. This could make it easy to conduct denial of service attacks against Expat by constructing an XML document that would cause pathological hash collisions in Expat's internal data structures, consuming large amounts CPU and RAM. The vulnerability exists in Python versions 3.7.0, 3.6.0 through 3.6.6, 3.5.0 through 3.5.6, 3.4.0 through 3.4.9, 2.7.0 through 2.7.15.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
Configuration 6 (hide)
|
History
21 Nov 2024, 03:49
Type | Values Removed | Values Added |
---|---|---|
References | () http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html - Mailing List, Third Party Advisory | |
References | () http://www.securityfocus.com/bid/105396 - Third Party Advisory, VDB Entry | |
References | () http://www.securitytracker.com/id/1041740 - Third Party Advisory, VDB Entry | |
References | () https://access.redhat.com/errata/RHSA-2019:1260 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2019:2030 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2019:3725 - Third Party Advisory | |
References | () https://bugs.python.org/issue34623 - Issue Tracking, Patch, Vendor Advisory | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14647 - Issue Tracking, Third Party Advisory | |
References | () https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0%40%3Cissues.bookkeeper.apache.org%3E - | |
References | () https://lists.debian.org/debian-lts-announce/2019/06/msg00022.html - Mailing List, Third Party Advisory | |
References | () https://lists.debian.org/debian-lts-announce/2019/06/msg00023.html - Mailing List, Third Party Advisory | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RBJCB2HWOJLP3L7CUQHJHNBHLSVOXJE5/ - | |
References | () https://usn.ubuntu.com/3817-1/ - Third Party Advisory | |
References | () https://usn.ubuntu.com/3817-2/ - Third Party Advisory | |
References | () https://www.debian.org/security/2018/dsa-4306 - Third Party Advisory | |
References | () https://www.debian.org/security/2018/dsa-4307 - Third Party Advisory |
Information
Published : 2018-09-25 00:29
Updated : 2024-11-21 03:49
NVD link : CVE-2018-14647
Mitre link : CVE-2018-14647
CVE.ORG link : CVE-2018-14647
JSON object : View
Products Affected
fedoraproject
- fedora
redhat
- enterprise_linux_desktop
- enterprise_linux_server
- enterprise_linux_workstation
opensuse
- leap
python
- python
canonical
- ubuntu_linux
debian
- debian_linux