Python's elementtree C accelerator failed to initialise Expat's hash salt during initialization. This could make it easy to conduct denial of service attacks against Expat by constructing an XML document that would cause pathological hash collisions in Expat's internal data structures, consuming large amounts CPU and RAM. The vulnerability exists in Python versions 3.7.0, 3.6.0 through 3.6.6, 3.5.0 through 3.5.6, 3.4.0 through 3.4.9, 2.7.0 through 2.7.15.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
Configuration 6 (hide)
|
History
21 Nov 2024, 03:49
Type | Values Removed | Values Added |
---|---|---|
References | () http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html - Mailing List, Third Party Advisory | |
References | () http://www.securityfocus.com/bid/105396 - Third Party Advisory, VDB Entry | |
References | () http://www.securitytracker.com/id/1041740 - Third Party Advisory, VDB Entry | |
References | () https://access.redhat.com/errata/RHSA-2019:1260 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2019:2030 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2019:3725 - Third Party Advisory | |
References | () https://bugs.python.org/issue34623 - Issue Tracking, Patch, Vendor Advisory | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14647 - Issue Tracking, Third Party Advisory | |
References | () https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0%40%3Cissues.bookkeeper.apache.org%3E - | |
References | () https://lists.debian.org/debian-lts-announce/2019/06/msg00022.html - Mailing List, Third Party Advisory | |
References | () https://lists.debian.org/debian-lts-announce/2019/06/msg00023.html - Mailing List, Third Party Advisory | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RBJCB2HWOJLP3L7CUQHJHNBHLSVOXJE5/ - | |
References | () https://usn.ubuntu.com/3817-1/ - Third Party Advisory | |
References | () https://usn.ubuntu.com/3817-2/ - Third Party Advisory | |
References | () https://www.debian.org/security/2018/dsa-4306 - Third Party Advisory | |
References | () https://www.debian.org/security/2018/dsa-4307 - Third Party Advisory |
07 Nov 2023, 02:53
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Information
Published : 2018-09-25 00:29
Updated : 2024-11-21 03:49
NVD link : CVE-2018-14647
Mitre link : CVE-2018-14647
CVE.ORG link : CVE-2018-14647
JSON object : View
Products Affected
redhat
- enterprise_linux_server
- enterprise_linux_desktop
- enterprise_linux_workstation
python
- python
canonical
- ubuntu_linux
opensuse
- leap
debian
- debian_linux
fedoraproject
- fedora