CVE-2020-14422

NameCVE-2020-14422
DescriptionLib/ipaddress.py in Python through 3.8.3 improperly computes hash values in the IPv4Interface and IPv6Interface classes, which might allow a remote attacker to cause a denial of service if an application is affected by the performance of a dictionary containing IPv4Interface or IPv6Interface objects, and this attacker can cause many dictionary entries to be created.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
ReferencesDLA-2280-1
NVD severitymedium

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
python3.5 (PTS)stretch3.5.3-1+deb9u1vulnerable
stretch (security)3.5.3-1+deb9u2fixed
python3.7 (PTS)buster3.7.3-2+deb10u2fixed
python3.8 (PTS)bullseye, sid3.8.6-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
python3.4source(unstable)(unfixed)
python3.5sourcestretch3.5.3-1+deb9u2DLA-2280-1
python3.5source(unstable)(unfixed)
python3.7sourcebuster3.7.3-2+deb10u2
python3.7source(unstable)(unfixed)
python3.8source(unstable)3.8.4~rc1-1

Notes

[jessie] - python3.4 <postponed> (Minor issue, DoS with constraints)
https://bugs.python.org/issue41004
https://github.com/python/cpython/pull/20956
https://github.com/python/cpython/pull/21033
https://github.com/python/cpython/commit/b30ee26e366bf509b7538d79bfec6c6d38d53f28 (master)
https://github.com/python/cpython/commit/9a646aa82dfa62d70ca2a99ada901ee6cf9f82bd (3.9-branch)
https://github.com/python/cpython/commit/dc8ce8ead182de46584cc1ed8a8c51d48240cbd5 (v3.8.4rc1)
https://github.com/python/cpython/commit/b98e7790c77a4378ec4b1c71b84138cb930b69b7 (3.7-branch)
https://github.com/python/cpython/commit/cfc7ff8d05f7a949a88b8a8dd506fb5c1c30d3e9 (3.6-branch)

Search for package or bug name: Reporting problems