Updated: 2023-07-20 12:27:39.171848
Description:
Python 3.x through 3.9.1 has a buffer overflow in PyCArg_repr in _ctypes/callproc.c, which may lead to remote code execution in certain Python applications that accept floating-point numbers as untrusted input, as demonstrated by a 1e300 argument to c_double.from_param. This occurs because sprintf is used unsafely.
Links | NIST | CIRCL | RHEL | Ubuntu |
Severity | Score | |
---|---|---|
CVSS Version 2.x | HIGH | 7.5 |
CVSS Version 3.x | CRITICAL | 9.8 |
OS name | Project name | Version | Score | Severity | Status | Errata | Last updated |
---|---|---|---|---|---|---|---|
CentOS 7 ELS | python3 | 3.6.8 | 9.8 | CRITICAL | In Testing | 2023-09-19 14:07:45 | |
CentOS 8.4 ELS | python3 | 3.6.8 | 9.8 | CRITICAL | Not Vulnerable | 2022-03-10 03:59:53 | |
CentOS 8.5 ELS | python3 | 3.6.8 | 9.8 | CRITICAL | Not Vulnerable | 2022-03-10 03:59:52 | |
Ubuntu 18.04 ELS | python3.6 | 3.6.9-1 | 9.8 | CRITICAL | Already Fixed | 2023-05-29 08:56:46 |