CVE-2012-1150
Publication date 9 March 2012
Last updated 24 July 2024
Ubuntu priority
Python before 2.6.8, 2.7.x before 2.7.3, 3.x before 3.1.5, and 3.2.x before 3.2.3 computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted input to an application that maintains a hash table.
Status
Package | Ubuntu Release | Status |
---|---|---|
python2.4 | ||
python2.5 | ||
python2.6 | ||
python2.7 | ||
python3.1 | ||
python3.2 | ||
Notes
jdstrand
patch does not change the default, so the risk of backporting to python2.5 and python2.4 outweighs the benefit of adding the patch. Ubuntu 8.04 LTS who require this patch should upgrade to Ubuntu 10.04 LTS or another supported release. the patch for 3.2 on oneiric is somewhere between the upstream 3.1 and 3.2 patches. Specifically, need the Modules/_datetimemodule.c changes
Patch details
Package | Patch details |
---|---|
python2.6 | |
python2.7 | |
python3.1 | |
python3.2 |
References
Related Ubuntu Security Notices (USN)
- USN-1592-1
- Python 2.7 vulnerabilities
- 2 October 2012
- USN-1616-1
- Python 3.1 vulnerabilities
- 24 October 2012
- USN-1615-1
- Python 3.2 vulnerabilities
- 23 October 2012
- USN-1596-1
- Python 2.6 vulnerabilities
- 4 October 2012