This issue tracker has been migrated to GitHub, and is currently read-only.
For more information, see the GitHub FAQs in the Python's Developer Guide.

Author PaulMcMillan
Recipients Arfrever, Huzaifa.Sidhpurwala, Mark.Shannon, PaulMcMillan, Zhiping.Deng, alex, barry, benjamin.peterson, christian.heimes, dmalcolm, eric.araujo, georg.brandl, gvanrossum, jcea, lemburg, pitrou, terry.reedy, v+python, vstinner
Date 2012-01-06.02:50:27
SpamBayes Score 1.3031127e-05
Marked as misclassified No
Message-id <CAO_YWRVw9YW2VCE-voXwkgE=4BNXkc+wZ1ViwvsSDJxS0bpFNw@mail.gmail.com>
In-reply-to <1325814608.37.0.931640244089.issue13703@psf.upfronthosting.co.za>
Content
As Alex said, Java has refused to fix the issue.

I believe that Ruby 1.9 (at least the master branch code that I looked
at) is using murmurhash2 with a random seed.

In either case, yes, these functions are vulnerable to a number of
attacks. We're solving the problem more completely than they did.
History
Date User Action Args
2012-01-06 02:50:29PaulMcMillansetrecipients: + PaulMcMillan, lemburg, gvanrossum, barry, georg.brandl, terry.reedy, jcea, pitrou, vstinner, christian.heimes, benjamin.peterson, eric.araujo, Arfrever, v+python, alex, dmalcolm, Mark.Shannon, Zhiping.Deng, Huzaifa.Sidhpurwala
2012-01-06 02:50:28PaulMcMillanlinkissue13703 messages
2012-01-06 02:50:28PaulMcMillancreate