The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.

Vulnerability of Python: denial of service via XML Hash Collisions

Synthesis of the vulnerability 

An attacker can generate a fatal error via XML Hash Collisions of Python, in order to trigger a denial of service.
Vulnerable software: Debian, IBM i, McAfee Web Gateway, openSUSE Leap, Solaris, Python, RHEL, Slackware, SUSE Linux Enterprise Desktop, SLES, Ubuntu.
Severity of this announce: 2/4.
Creation date: 28/09/2018.
Références of this computer vulnerability: 34623, bulletinjul2019, CVE-2018-14647, DLA-1834-1, DLA-1835-1, DLA-1835-2, DSA-4306-1, DSA-4307-1, ibm10876694, openSUSE-SU-2019:0292-1, openSUSE-SU-2020:0086-1, RHSA-2019:2030-01, RHSA-2019:3725-01, RHSA-2020:1268-01, RHSA-2020:1346-01, RHSA-2020:1462-01, SSA:2019-062-01, SUSE-SU-2018:3156-1, SUSE-SU-2019:0482-1, SUSE-SU-2019:0482-2, SUSE-SU-2019:2053-1, SUSE-SU-2019:2053-2, SUSE-SU-2020:0114-1, SUSE-SU-2020:0234-1, USN-3817-1, USN-3817-2, VIGILANCE-VUL-27355.

Description of the vulnerability 

An attacker can generate a fatal error via XML Hash Collisions of Python, in order to trigger a denial of service.
Full bulletin, software filtering, emails, fixes, ... (Request your free trial)

This computer vulnerability note impacts software or systems such as Debian, IBM i, McAfee Web Gateway, openSUSE Leap, Solaris, Python, RHEL, Slackware, SUSE Linux Enterprise Desktop, SLES, Ubuntu.

Our Vigil@nce team determined that the severity of this computer vulnerability announce is medium.

The trust level is of type confirmed by the editor, with an origin of document.

An attacker with a expert ability can exploit this cybersecurity announce.

Solutions for this threat 

Python: version 3.5.7.
The version 3.5.7 is fixed:
  https://www.python.org/downloads/

Python: version 3.4.10.
The version 3.4.10 is fixed:
  https://www.python.org/downloads/

Python: patch for XML Hash Collisions.
A patch is indicated in information sources.

Debian 8: new python2.7 packages.
New packages are available:
  Debian 8: python2.7 2.7.9-2+deb8u3

Debian 8: new python3.4 packages.
New packages are available:
  Debian 8: python3.4 3.4.2-1+deb8u4

Debian 9: new python2.7 packages.
New packages are available:
  Debian 9: python2.7 2.7.13-2+deb9u3

Debian 9: new python3.5 packages.
New packages are available:
  Debian 9: python3.5 3.5.3-1+deb9u1

IBM i: patch for Python.
A patch is indicated in information sources.

McAfee Web Gateway: version 8.2.2.
The version 8.2.2 is fixed:
  https://www.mcafee.com/enterprise/en-us/downloads/my-products.html

McAfee Web Gateway: version 9.0.
The version 9.0 is fixed:
  https://www.mcafee.com/enterprise/en-us/downloads/my-products.html

openSUSE Leap 15.1: new python3 packages (22/01/2020).
New packages are available:
  openSUSE Leap 15.1: python3 3.6.10-lp151.6.7.1

openSUSE Leap 42.3: new python packages.
New packages are available:
  openSUSE Leap 42.3: python 2.7.13-27.12.1

Oracle Solaris: patch for third party software of July 2019 v2.
A patch is available:
  https://support.oracle.com/rs?type=doc&id=1448883.1

RHEL 6/7: new rh-python36-python packages.
New packages are available:
  RHEL 6: rh-python36-python 3.6.9-2.el6
  RHEL 7: rh-python36-python 3.6.9-2.el7

RHEL 7.4: new python packages.
New packages are available:
  RHEL 7.4: python 2.7.5-63.el7_4

RHEL 7.5: new python packages.
New packages are available:
  RHEL 7.5: python 2.7.5-74.el7_5

RHEL 7.6: new python packages.
New packages are available:
  RHEL 7.6: python 2.7.5-83.el7_6

RHEL 7: new python packages.
New packages are available:
  RHEL 7: python 2.7.5-86.el7

Slackware: new python packages.
New packages are available:
  Slackware 14.0: python 2.7.16-*-1_slack14.0
  Slackware 14.1: python 2.7.16-*-1_slack14.1
  Slackware 14.2: python 2.7.16-*-1_slack14.2

SUSE LE 11 SP4: new python packages.
New packages are available:
  SUSE LE 11 SP4: python 2.6-8.40.21.1

SUSE LE 12: new python3 packages.
New packages are available:
  SUSE LE 12 SP1: python3 3.4.6-25.29.1
  SUSE LE 12 SP2: python3 3.4.6-25.29.1
  SUSE LE 12 SP3: python3 3.4.6-25.29.1
  SUSE LE 12 SP4: python3 3.4.6-25.29.1
  SUSE LE 12 SP5: python3 3.4.6-25.29.1

SUSE LE 12: new python packages.
New packages are available:
  SUSE LE 12 SP1: python 2.7.13-28.21.1
  SUSE LE 12 SP2: python 2.7.13-28.21.1
  SUSE LE 12 SP3: python 2.7.13-28.21.1
  SUSE LE 12 SP4: python 2.7.13-28.21.1

SUSE LE 12 SP3: new python3 packages.
New packages are available:
  SUSE LE 12 SP3: python3 3.4.6-25.29.1

SUSE LE 15: new python3 packages (16/01/2020).
New packages are available:
  SUSE LE 15 RTM: python3 3.6.10-3.42.2
  SUSE LE 15 SP1: python3 3.6.10-3.42.2

SUSE LE 15: new python packages (27/01/2020).
New packages are available:
  SUSE LE 15 RTM: python 2.7.17-7.32.2
  SUSE LE 15 SP1: python 2.7.17-7.32.2

Ubuntu: new python packages.
New packages are available:
  Ubuntu 18.04 LTS: python2.7 2.7.15~rc1-1ubuntu0.1
  Ubuntu 16.04 LTS: python2.7 2.7.12-1ubuntu0~16.04.4, python3.5 3.5.2-2ubuntu0~16.04.5
  Ubuntu 14.04 LTS: python2.7 2.7.6-8ubuntu0.5, python3.4 3.4.3-1ubuntu1~14.04.7
  Ubuntu 12.04 ESM: python2.7 2.7.3-0ubuntu3.11

Wind River Linux: solution (28/11/2018).
The solution is indicated in information sources.
Full bulletin, software filtering, emails, fixes, ... (Request your free trial)

Computer vulnerabilities tracking service 

Vigil@nce provides a network vulnerability workaround. The technology watch team tracks security threats targeting the computer system.