Movatterモバイル変換


[0]ホーム

URL:


Skip to content

Navigation Menu

Sign in
Appearance settings

Search code, repositories, users, issues, pull requests...

Provide feedback

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly

Sign up
Appearance settings

[3.6] bpo-41004: Resolve hash collisions for IPv4Interface and IPv6In…#21232

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to ourterms of service andprivacy statement. We’ll occasionally send you account related emails.

Already on GitHub?Sign in to your account

Merged
ned-deily merged 1 commit intopython:3.6fromtapakund:3.6
Jun 30, 2020

Conversation

tapakund
Copy link

@tapakundtapakund commentedJun 30, 2020
edited by bedevere-bot
Loading

…terface (GH-21033)

Thehash() methods of classes IPv4Interface and IPv6Interface had issue
of generating constant hash values of 32 and 128 respectively causing hash collisions.
The fix uses the hash() function to generate hash values for the objects
instead of XOR operation
(cherry picked from commitb30ee26)

Co-authored-by: Ravi Teja Prvteja92@gmail.com

Signed-off-by: Tapas Kundutkundu@vmware.com

https://bugs.python.org/issue41004

@corona10
Copy link
Member

Sorry, we only accept the security patch for 3.5-3.7.

I close this PR cc@ericvsmith

ref:https://devguide.python.org/#status-of-python-branches

@tapakund
Copy link
Author

@corona10 this is assigned aCVE-2020-14422

Pls refer:https://nvd.nist.gov/vuln/detail?vulnId=CVE-2020-14422

Let me know if i am wrong.

@corona10
Copy link
Member

@tapakund
Thanks for let me know in this case, we should re-open the PR and the issue :)

Copy link
Member

@corona10corona10 left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others.Learn more.

Since this issue is reported as theCVE-2020-14422.
I am okay to merge this PR as the security issue.

But waiting@ned-deily and@ericvsmith 's comment :)

@ned-deily
Copy link
Member

As I commented on the bpo issue, please add the CVE to the NEWS item.

…terface (pythonGH-21033)The __hash__() methods of classes IPv4Interface and IPv6Interface had issueof generating constant hash values of 32 and 128 respectively causing hash collisions.The fix uses the hash() function to generate hash values for the objectsinstead of XOR operation(cherry picked from commitb30ee26)Co-authored-by: Ravi Teja P <rvteja92@gmail.com>Signed-off-by: Tapas Kundu <tkundu@vmware.com>
@ned-deilyned-deily merged commitcfc7ff8 intopython:3.6Jun 30, 2020
@sshuklao
Copy link

Can we get the new build of Python 3.6 which has this fix available publically?

@sshuklao
Copy link

@ned-deily ^^^

@ned-deily
Copy link
Member

ned-deily commentedJul 11, 2020
edited
Loading

@sshuklao Just to be clear, we do not provide builds, as in binary builds, for Python versions, like 3.6, that are in thesecurity-fix phase of their life cycle. For 3.6, our policy has been to provide periodic source-only releases that rollup any new fixes since the previous rollup. The most recent rollup was just a few weeks ago, several days before this fix was published. There is a fix for a different problem that has also been published since then, so we may do the next rollup sooner than usual. We expect that third-party distributors supporting 3.6 will pick up fixes according to their support policies. If you are on your own and/or need the fix immediately, you can always apply the latest fixes yourself from the cpython GitHub repo 3.6 branch, either using git directly (https://github.com/python/cpython/tree/3.6) or you can download a GitHub-produced zip archive of the current state of the branch (https://github.com/python/cpython/archive/3.6.zip).

Sign up for freeto join this conversation on GitHub. Already have an account?Sign in to comment
Reviewers

@corona10corona10corona10 approved these changes

@ned-deilyned-deilyned-deily approved these changes

@ericvsmithericvsmithAwaiting requested review from ericvsmith

Assignees
No one assigned
Labels
type-securityA security issue
Projects
None yet
Milestone
No milestone
Development

Successfully merging this pull request may close these issues.

6 participants
@tapakund@corona10@ned-deily@sshuklao@the-knights-who-say-ni@bedevere-bot

[8]ページ先頭

©2009-2025 Movatter.jp