DEBIAN-CVE-2020-14422

Source
https://security-tracker.debian.org/tracker/CVE-2020-14422
Import Source
https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2020-14422.json
JSON Data
https://api.osv.dev/v1/vulns/DEBIAN-CVE-2020-14422
Upstream
Published
2020-06-18T14:15:11Z
Modified
2025-09-30T05:13:50.905411Z
Severity
  • 5.9 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
[none]
Details

Lib/ipaddress.py in Python through 3.8.3 improperly computes hash values in the IPv4Interface and IPv6Interface classes, which might allow a remote attacker to cause a denial of service if an application is affected by the performance of a dictionary containing IPv4Interface or IPv6Interface objects, and this attacker can cause many dictionary entries to be created. This is fixed in: v3.5.10, v3.5.10rc1; v3.6.12; v3.7.9; v3.8.4, v3.8.4rc1, v3.8.5, v3.8.6, v3.8.6rc1; v3.9.0, v3.9.0b4, v3.9.0b5, v3.9.0rc1, v3.9.0rc2.

References

Affected packages

Debian:11 / python-ipaddress

Package

Name
python-ipaddress
Purl
pkg:deb/debian/python-ipaddress?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*

1.0.23-1
1.0.23-2

Ecosystem specific

{
    "urgency": "not yet assigned"
}