Uh oh!
There was an error while loading.Please reload this page.
- Notifications
You must be signed in to change notification settings - Fork32k
[3.5] bpo-41004: Resolve hash collisions for IPv4Interface and IPv6In…#21233
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to ourterms of service andprivacy statement. We’ll occasionally send you account related emails.
Already on GitHub?Sign in to your account
Uh oh!
There was an error while loading.Please reload this page.
Conversation
Sorry, we only accept the security patch for 3.5-3.7. I close this PR cc@ericvsmith |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others.Learn more.
Since this issue is reported as theCVE-2020-14422.
I am okay to merge this PR as the security issue.
But waiting for@ned-deily and@ericvsmith 's comment :)
The decision whether to merge to 3.5 is up to the 3.5 release manager,@larryhastings. |
As I noted on the bpo issue, I think the NEWS blurb should be updated to include the CVE. |
…terface (pythonGH-21033)The __hash__() methods of classes IPv4Interface and IPv6Interface had issueof generating constant hash values of 32 and 128 respectively causing hash collisions.The fix uses the hash() function to generate hash values for the objectsinstead of XOR operation(cherry picked from commitb30ee26)Co-authored-by: Ravi Teja P <rvteja92@gmail.com>Signed-off-by: Tapas Kundu <tkundu@vmware.com>
@larryhastings Please help to review the backport to 3.5 of a security fix. Thanks! |
bedevere-bot commentedAug 4, 2020
@larryhastings: Please replace |
Thanks for the backport! And, for the record,@ericvsmith is a great guy, but he is not nor has ever been a Python release manager. |
HanaMahmoud122 commentedJan 7, 2024
|
Uh oh!
There was an error while loading.Please reload this page.
…terface (GH-21033)
Thehash() methods of classes IPv4Interface and IPv6Interface had issue
of generating constant hash values of 32 and 128 respectively causing hash collisions.
The fix uses the hash() function to generate hash values for the objects
instead of XOR operation
(cherry picked from commitb30ee26)
Co-authored-by: Ravi Teja Prvteja92@gmail.com
Signed-off-by: Tapas Kundutkundu@vmware.com
https://bugs.python.org/issue41004