Python's elementtree C accelerator failed to initialise Expat's hash salt during initialization. This could make it easy to conduct denial of service attacks against Expat by constructing an XML document that would cause pathological hash collisions in Expat's internal data structures, consuming large amounts CPU and RAM. The vulnerability exists in Python versions 3.7.0, 3.6.0 through 3.6.6, 3.5.0 through 3.5.6, 3.4.0 through 3.4.9, 2.7.0 through 2.7.15.
https://www.debian.org/security/2018/dsa-4307
https://www.debian.org/security/2018/dsa-4306
https://usn.ubuntu.com/3817-2/
https://usn.ubuntu.com/3817-1/
https://lists.debian.org/debian-lts-announce/2019/06/msg00023.html
https://lists.debian.org/debian-lts-announce/2019/06/msg00022.html
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14647
https://bugs.python.org/issue34623
https://access.redhat.com/errata/RHSA-2019:3725
https://access.redhat.com/errata/RHSA-2019:2030
https://access.redhat.com/errata/RHSA-2019:1260
http://www.securitytracker.com/id/1041740
http://www.securityfocus.com/bid/105396
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html