Author PaulMcMillan
Recipients Arfrever, Huzaifa.Sidhpurwala, Mark.Shannon, PaulMcMillan, Zhiping.Deng, alex, barry, benjamin.peterson, christian.heimes, dmalcolm, eric.araujo, georg.brandl, gvanrossum, jcea, lemburg, pitrou, terry.reedy, v+python, vstinner
Date 2012-01-06.02:50:27
SpamBayes Score 1.30311e-05
Marked as misclassified No
Message-id <CAO_YWRVw9YW2VCE-voXwkgE=4BNXkc+wZ1ViwvsSDJxS0bpFNw@mail.gmail.com>
In-reply-to <1325814608.37.0.931640244089.issue13703@psf.upfronthosting.co.za>
Content
As Alex said, Java has refused to fix the issue.

I believe that Ruby 1.9 (at least the master branch code that I looked
at) is using murmurhash2 with a random seed.

In either case, yes, these functions are vulnerable to a number of
attacks. We're solving the problem more completely than they did.
History
Date User Action Args
2012-01-06 02:50:29PaulMcMillansetrecipients: + PaulMcMillan, lemburg, gvanrossum, barry, georg.brandl, terry.reedy, jcea, pitrou, vstinner, christian.heimes, benjamin.peterson, eric.araujo, Arfrever, v+python, alex, dmalcolm, Mark.Shannon, Zhiping.Deng, Huzaifa.Sidhpurwala
2012-01-06 02:50:28PaulMcMillanlinkissue13703 messages
2012-01-06 02:50:28PaulMcMillancreate