CVE-2012-1150
05.10.2012, 21:55
Python before 2.6.8, 2.7.x before 2.7.3, 3.x before 3.1.5, and 3.2.x before 3.2.3 computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted input to an application that maintains a hash table.Enginsight
| Vendor | Product | Version |
|---|---|---|
| python | python | 𝑥 ≤ 2.6.7 |
| python | python | 0.9.0 |
| python | python | 0.9.1 |
| python | python | 1.2 |
| python | python | 1.3 |
| python | python | 1.5.2 |
| python | python | 1.6 |
| python | python | 1.6.1 |
| python | python | 2.0 |
| python | python | 2.0.1 |
| python | python | 2.1 |
| python | python | 2.1.1 |
| python | python | 2.1.2 |
| python | python | 2.1.3 |
| python | python | 2.2 |
| python | python | 2.2.1 |
| python | python | 2.2.2 |
| python | python | 2.2.3 |
| python | python | 2.3.1 |
| python | python | 2.3.2 |
| python | python | 2.3.3 |
| python | python | 2.3.4 |
| python | python | 2.3.5 |
| python | python | 2.3.7 |
| python | python | 2.4.1 |
| python | python | 2.4.2 |
| python | python | 2.4.3 |
| python | python | 2.4.4 |
| python | python | 2.4.6 |
| python | python | 2.5.1 |
| python | python | 2.5.2 |
| python | python | 2.5.3 |
| python | python | 2.5.4 |
| python | python | 2.5.6 |
| python | python | 2.5.150 |
| python | python | 2.6.1 |
| python | python | 2.6.2 |
| python | python | 2.6.3 |
| python | python | 2.6.4 |
| python | python | 2.6.5 |
| python | python | 2.6.6 |
| python | python | 2.6.2150 |
| python | python | 2.6.6150 |
| python | python | 2.7.1 |
| python | python | 2.7.1:rc1 |
| python | python | 2.7.2:rc1 |
| python | python | 2.7.1150 |
| python | python | 2.7.2150 |
| python | python | 3.0 |
| python | python | 3.0.1 |
| python | python | 3.1 |
| python | python | 3.1.1 |
| python | python | 3.1.2 |
| python | python | 3.1.3 |
| python | python | 3.1.4 |
| python | python | 3.2 |
| python | python | 3.2:alpha |
| python | python | 3.2.2150 |
𝑥
= Vulnerable software versions
Ubuntu Releases
Ubuntu Product | |||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| python2.4 |
| ||||||||||||||
| python2.5 |
| ||||||||||||||
| python2.6 |
| ||||||||||||||
| python2.7 |
| ||||||||||||||
| python3.1 |
| ||||||||||||||
| python3.2 |
|
Common Weakness Enumeration
References