Blame SOURCES/00352-resolve-hash-collisions-for-ipv4interface-and-ipv6interface.patch

bca232
From 0000000000000000000000000000000000000000 Mon Sep 17 00:00:00 2001
bca232
From: Tapas Kundu <39723251+tapakund@users.noreply.github.com>
bca232
Date: Wed, 1 Jul 2020 01:00:22 +0530
bca232
Subject: [PATCH] 00352: Resolve hash collisions for IPv4Interface and
bca232
 IPv6Interface
bca232
bca232
CVE-2020-14422
bca232
The hash() methods of classes IPv4Interface and IPv6Interface had issue
bca232
of generating constant hash values of 32 and 128 respectively causing hash collisions.
bca232
The fix uses the hash() function to generate hash values for the objects
bca232
instead of XOR operation.
bca232
Fixed upstream: https://bugs.python.org/issue41004
bca232
---
bca232
 Lib/ipaddress.py                                      |  4 ++--
bca232
 Lib/test/test_ipaddress.py                            | 11 +++++++++++
bca232
 .../Security/2020-06-29-16-02-29.bpo-41004.ovF0KZ.rst |  1 +
bca232
 3 files changed, 14 insertions(+), 2 deletions(-)
bca232
 create mode 100644 Misc/NEWS.d/next/Security/2020-06-29-16-02-29.bpo-41004.ovF0KZ.rst
bca232
bca232
diff --git a/Lib/ipaddress.py b/Lib/ipaddress.py
bca232
index 583f02ad54..98492136ca 100644
bca232
--- a/Lib/ipaddress.py
bca232
+++ b/Lib/ipaddress.py
bca232
@@ -1418,7 +1418,7 @@ class IPv4Interface(IPv4Address):
bca232
             return False
bca232
 
bca232
     def __hash__(self):
bca232
-        return self._ip ^ self._prefixlen ^ int(self.network.network_address)
bca232
+        return hash((self._ip, self._prefixlen, int(self.network.network_address)))
bca232
 
bca232
     __reduce__ = _IPAddressBase.__reduce__
bca232
 
bca232
@@ -2092,7 +2092,7 @@ class IPv6Interface(IPv6Address):
bca232
             return False
bca232
 
bca232
     def __hash__(self):
bca232
-        return self._ip ^ self._prefixlen ^ int(self.network.network_address)
bca232
+        return hash((self._ip, self._prefixlen, int(self.network.network_address)))
bca232
 
bca232
     __reduce__ = _IPAddressBase.__reduce__
bca232
 
bca232
diff --git a/Lib/test/test_ipaddress.py b/Lib/test/test_ipaddress.py
bca232
index 1cef4217bc..7de444af4a 100644
bca232
--- a/Lib/test/test_ipaddress.py
bca232
+++ b/Lib/test/test_ipaddress.py
bca232
@@ -1990,6 +1990,17 @@ class IpaddrUnitTest(unittest.TestCase):
bca232
                          sixtofouraddr.sixtofour)
bca232
         self.assertFalse(bad_addr.sixtofour)
bca232
 
bca232
+    # issue41004 Hash collisions in IPv4Interface and IPv6Interface
bca232
+    def testV4HashIsNotConstant(self):
bca232
+        ipv4_address1 = ipaddress.IPv4Interface("1.2.3.4")
bca232
+        ipv4_address2 = ipaddress.IPv4Interface("2.3.4.5")
bca232
+        self.assertNotEqual(ipv4_address1.__hash__(), ipv4_address2.__hash__())
bca232
+
bca232
+    # issue41004 Hash collisions in IPv4Interface and IPv6Interface
bca232
+    def testV6HashIsNotConstant(self):
bca232
+        ipv6_address1 = ipaddress.IPv6Interface("2001:658:22a:cafe:200:0:0:1")
bca232
+        ipv6_address2 = ipaddress.IPv6Interface("2001:658:22a:cafe:200:0:0:2")
bca232
+        self.assertNotEqual(ipv6_address1.__hash__(), ipv6_address2.__hash__())
bca232
 
bca232
 if __name__ == '__main__':
bca232
     unittest.main()
bca232
diff --git a/Misc/NEWS.d/next/Security/2020-06-29-16-02-29.bpo-41004.ovF0KZ.rst b/Misc/NEWS.d/next/Security/2020-06-29-16-02-29.bpo-41004.ovF0KZ.rst
bca232
new file mode 100644
bca232
index 0000000000..f5a9db52ff
bca232
--- /dev/null
bca232
+++ b/Misc/NEWS.d/next/Security/2020-06-29-16-02-29.bpo-41004.ovF0KZ.rst
bca232
@@ -0,0 +1 @@
bca232
+CVE-2020-14422: The __hash__() methods of  ipaddress.IPv4Interface and ipaddress.IPv6Interface incorrectly generated constant hash values of 32 and 128 respectively. This resulted in always causing hash collisions. The fix uses hash() to generate hash values for the tuple of (address, mask length, network address).