{"id":"CVE-2018-14647","details":"Python's elementtree C accelerator failed to initialise Expat's hash salt during initialization. This could make it easy to conduct denial of service attacks against Expat by constructing an XML document that would cause pathological hash collisions in Expat's internal data structures, consuming large amounts CPU and RAM. The vulnerability exists in Python versions 3.7.0, 3.6.0 through 3.6.6, 3.5.0 through 3.5.6, 3.4.0 through 3.4.9, 2.7.0 through 2.7.15.","aliases":["PSF-2018-5"],"modified":"2026-03-20T11:23:27.120729Z","published":"2018-09-25T00:29:00.703Z","related":["MGASA-2018-0495","MGASA-2019-0135","SUSE-SU-2018:3156-1","SUSE-SU-2019:0482-1","SUSE-SU-2019:0482-2","SUSE-SU-2019:2053-1","SUSE-SU-2019:2053-2","SUSE-SU-2020:0114-1","SUSE-SU-2020:0234-1","SUSE-SU-2020:2699-1","openSUSE-SU-2020:0086-1","openSUSE-SU-2024:11202-1","openSUSE-SU-2024:11284-1"],"references":[{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RBJCB2HWOJLP3L7CUQHJHNBHLSVOXJE5/"},{"type":"WEB","url":"https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0%40%3Cissues.bookkeeper.apache.org%3E"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2019:3725"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2019/06/msg00022.html"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/3817-1/"},{"type":"ADVISORY","url":"http://www.securitytracker.com/id/1041740"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2019:2030"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/3817-2/"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html"},{"type":"ADVISORY","url":"http://www.securityfocus.com/bid/105396"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2019:1260"},{"type":"ADVISORY","url":"https://www.debian.org/security/2018/dsa-4306"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2019/06/msg00023.html"},{"type":"ADVISORY","url":"https://www.debian.org/security/2018/dsa-4307"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14647"},{"type":"FIX","url":"https://bugs.python.org/issue34623"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/python/cpython","events":[{"introduced":"0"},{"last_affected":"ca079a3ea30098aff3197c559a0e32d42dda6d84"},{"introduced":"3101b7076270756f8be699358c69c5d15ea2cc48"},{"last_affected":"0a5a5af9b6b47727c5ee3def4508dab312949075"},{"introduced":"2e789a1f1d84b343a996e8654590703b5fbdd441"},{"last_affected":"627d0c61ac96009450e3794a2401f244e56fcb79"},{"introduced":"5c4568a05a0a62b5947c55f68f9f2ecfb90a4f12"},{"last_affected":"4cf1f54eb764f856fda5a394d8598c0c90d69d77"},{"introduced":"0"},{"last_affected":"1bf9cc509326bc42cd8cb1650eb9bf64550d817e"}],"database_specific":{"versions":[{"introduced":"2.7.0"},{"last_affected":"2.7.15"},{"introduced":"3.4.0"},{"last_affected":"3.4.9"},{"introduced":"3.5.0"},{"last_affected":"3.5.6"},{"introduced":"3.6.0"},{"last_affected":"3.6.6"},{"introduced":"0"},{"last_affected":"3.7.0"}]}}],"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"12.04"}]},{"events":[{"introduced":"0"},{"last_affected":"14.04"}]},{"events":[{"introduced":"0"},{"last_affected":"16.04"}]},{"events":[{"introduced":"0"},{"last_affected":"18.04"}]},{"events":[{"introduced":"0"},{"last_affected":"8.0"}]},{"events":[{"introduced":"0"},{"last_affected":"9.0"}]},{"events":[{"introduced":"0"},{"last_affected":"30"}]},{"events":[{"introduced":"0"},{"last_affected":"15.1"}]},{"events":[{"introduced":"0"},{"last_affected":"7.0"}]},{"events":[{"introduced":"0"},{"last_affected":"7.0"}]},{"events":[{"introduced":"0"},{"last_affected":"7.0"}]}],"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2018-14647.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}]}