CVE-2012-1150
Publication date 9 March 2012
Last updated 24 July 2024
Ubuntu priority
Python before 2.6.8, 2.7.x before 2.7.3, 3.x before 3.1.5, and 3.2.x before 3.2.3 computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted input to an application that maintains a hash table.
Status
Package | Ubuntu Release | Status |
---|---|---|
python2.4 | 12.10 quantal | Not in release |
12.04 LTS precise | Not in release | |
11.10 oneiric | Not in release | |
11.04 natty | Not in release | |
10.10 maverick | Not in release | |
10.04 LTS lucid | Not in release | |
8.04 LTS hardy | Ignored | |
python2.5 | 12.10 quantal | Not in release |
12.04 LTS precise | Not in release | |
11.10 oneiric | Not in release | |
11.04 natty | Not in release | |
10.10 maverick | Not in release | |
10.04 LTS lucid | Not in release | |
8.04 LTS hardy | Ignored | |
python2.6 | 12.10 quantal | Not in release |
12.04 LTS precise | Not in release | |
11.10 oneiric |
Fixed 2.6.7-4ubuntu1.1
|
|
11.04 natty |
Fixed 2.6.6-6ubuntu7.1
|
|
10.10 maverick | Ignored end of life | |
10.04 LTS lucid |
Fixed 2.6.5-1ubuntu6.1
|
|
8.04 LTS hardy | Not in release | |
python2.7 | 12.10 quantal |
Not affected
|
12.04 LTS precise |
Not affected
|
|
11.10 oneiric |
Fixed 2.7.2-5ubuntu1.1
|
|
11.04 natty |
Fixed 2.7.1-5ubuntu2.2
|
|
10.10 maverick | Ignored end of life | |
10.04 LTS lucid | Not in release | |
8.04 LTS hardy | Not in release | |
python3.1 | 12.10 quantal | Not in release |
12.04 LTS precise | Not in release | |
11.10 oneiric | Not in release | |
11.04 natty |
Fixed 3.1.3-1ubuntu1.2
|
|
10.10 maverick | Ignored end of life | |
10.04 LTS lucid |
Fixed 3.1.2-0ubuntu3.2
|
|
8.04 LTS hardy | Not in release | |
python3.2 | 12.10 quantal |
Not affected
|
12.04 LTS precise |
Not affected
|
|
11.10 oneiric |
Fixed 3.2.2-0ubuntu1.1
|
|
11.04 natty |
Fixed 3.2-1ubuntu1.2
|
|
10.10 maverick | Not in release | |
10.04 LTS lucid | Not in release | |
8.04 LTS hardy | Not in release |
Notes
jdstrand
patch does not change the default, so the risk of backporting to python2.5 and python2.4 outweighs the benefit of adding the patch. Ubuntu 8.04 LTS who require this patch should upgrade to Ubuntu 10.04 LTS or another supported release. the patch for 3.2 on oneiric is somewhere between the upstream 3.1 and 3.2 patches. Specifically, need the Modules/_datetimemodule.c changes
Patch details
Package | Patch details |
---|---|
python2.6 | |
python2.7 | |
python3.1 | |
python3.2 |
References
Related Ubuntu Security Notices (USN)
- USN-1592-1
- Python 2.7 vulnerabilities
- 2 October 2012
- USN-1616-1
- Python 3.1 vulnerabilities
- 24 October 2012
- USN-1615-1
- Python 3.2 vulnerabilities
- 23 October 2012
- USN-1596-1
- Python 2.6 vulnerabilities
- 4 October 2012