CVE-2018-20406
Modules/_pickle.c in Python before 3.7.1 has an integer overflow via a large LONG_BINPUT value that is mishandled during a "resize to twice the size" attempt. This issue might cause memory exhaustion, but is only relevant if the pickle format is used for serializing tens or hundreds of gigabytes of data. This issue is fixed in: v3.4.10, v3.4.10rc1; v3.5.10, v3.5.10rc1, v3.5.7, v3.5.7rc1, v3.5.8, v3.5.8rc1, v3.5.8rc2, v3.5.9; v3.6.10, v3.6.10rc1, v3.6.11, v3.6.11rc1, v3.6.12, v3.6.7, v3.6.7rc1, v3.6.7rc2, v3.6.8, v3.6.8rc1, v3.6.9, v3.6.9rc1; v3.7.1, v3.7.1rc1, v3.7.1rc2, v3.7.2, v3.7.2rc1, v3.7.3, v3.7.3rc1, v3.7.4, v3.7.4rc1, v3.7.4rc2, v3.7.5, v3.7.5rc1, v3.7.6, v3.7.6rc1, v3.7.7, v3.7.7rc1, v3.7.8, v3.7.8rc1, v3.7.9.
Published
2018-12-23T23:29:00.307
Last Modified
2024-11-21T04:01:25.520
Status
Modified
Source
[email protected]
Severity
CVSSv3.0: 7.5 (HIGH)
CVSSv2 Vector
AV:N/AC:L/Au:N/C:N/I:N/A:P
- Access Vector: NETWORK
- Access Complexity: LOW
- Authentication: NONE
- Confidentiality Impact: NONE
- Integrity Impact: NONE
- Availability Impact: PARTIAL
Exploitability Score
10.0
Impact Score
2.9
Weaknesses
Affected Vendors & Products
References
-
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html
([email protected])
-
https://access.redhat.com/errata/RHSA-2019:3725
([email protected])
-
https://bugs.python.org/issue34656
Exploit, Issue Tracking, Patch, Vendor Advisory
([email protected])
-
https://github.com/python/cpython/commit/a4ae828ee416a66d8c7bf5ee71d653c2cc6a26dd
Patch, Third Party Advisory
([email protected])
-
https://lists.debian.org/debian-lts-announce/2019/02/msg00011.html
Mailing List, Third Party Advisory
([email protected])
-
https://lists.debian.org/debian-lts-announce/2020/07/msg00011.html
([email protected])
-
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/46PVWY5LFP4BRPG3BVQ5QEEFYBVEXHCK/
([email protected])
-
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AEZ5IQT7OF7Q2NCGIVABOWYGKO7YU3NJ/
([email protected])
-
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D3LXPABKVLFYUHRYJPM3CSS5MS6FXKS7/
([email protected])
-
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ICBEGRHIPHWPG2VGYS6R4EVKVUUF4AQW/
([email protected])
-
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JSKPGPZQNTAULHW4UH63KGOOUIDE4RRB/
([email protected])
-
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TR6GCO3WTV4D5L23WTCBF275VE6BVNI3/
([email protected])
-
https://security.netapp.com/advisory/ntap-20190416-0010/
([email protected])
-
https://usn.ubuntu.com/4127-1/
([email protected])
-
https://usn.ubuntu.com/4127-2/
([email protected])
-
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html
(af854a3a-2127-422b-91ae-364da2661108)
-
https://access.redhat.com/errata/RHSA-2019:3725
(af854a3a-2127-422b-91ae-364da2661108)
-
https://bugs.python.org/issue34656
Exploit, Issue Tracking, Patch, Vendor Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
https://github.com/python/cpython/commit/a4ae828ee416a66d8c7bf5ee71d653c2cc6a26dd
Patch, Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
https://lists.debian.org/debian-lts-announce/2019/02/msg00011.html
Mailing List, Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
https://lists.debian.org/debian-lts-announce/2020/07/msg00011.html
(af854a3a-2127-422b-91ae-364da2661108)
-
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/46PVWY5LFP4BRPG3BVQ5QEEFYBVEXHCK/
(af854a3a-2127-422b-91ae-364da2661108)
-
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AEZ5IQT7OF7Q2NCGIVABOWYGKO7YU3NJ/
(af854a3a-2127-422b-91ae-364da2661108)
-
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D3LXPABKVLFYUHRYJPM3CSS5MS6FXKS7/
(af854a3a-2127-422b-91ae-364da2661108)
-
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ICBEGRHIPHWPG2VGYS6R4EVKVUUF4AQW/
(af854a3a-2127-422b-91ae-364da2661108)
-
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JSKPGPZQNTAULHW4UH63KGOOUIDE4RRB/
(af854a3a-2127-422b-91ae-364da2661108)
-
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TR6GCO3WTV4D5L23WTCBF275VE6BVNI3/
(af854a3a-2127-422b-91ae-364da2661108)
-
https://security.netapp.com/advisory/ntap-20190416-0010/
(af854a3a-2127-422b-91ae-364da2661108)
-
https://usn.ubuntu.com/4127-1/
(af854a3a-2127-422b-91ae-364da2661108)
-
https://usn.ubuntu.com/4127-2/
(af854a3a-2127-422b-91ae-364da2661108)