Описание
Python 3.x through 3.9.1 has a buffer overflow in PyCArg_repr in _ctypes/callproc.c, which may lead to remote code execution in certain Python applications that accept floating-point numbers as untrusted input, as demonstrated by a 1e300 argument to c_double.from_param. This occurs because sprintf is used unsafely.
A flaw was found in python. A stack-based buffer overflow was discovered in the ctypes module provided within Python. Applications that use ctypes without carefully validating the input passed to it may be vulnerable to this flaw, which would allow an attacker to overflow a buffer on the stack and crash the application. The highest threat from this vulnerability is to system availability.
Отчет
This flaw could have had a higher Impact, however our packages are compiled with FORTIFY_SOURCE, which provides runtime protection to some memory and string functions and prevents this flaw from actually overwriting the buffer and potentially executing code.
Затронутые пакеты
Платформа | Пакет | Состояние | Рекомендация | Релиз |
---|---|---|---|---|
Red Hat Enterprise Linux 5 | python | Out of support scope | ||
Red Hat Enterprise Linux 6 | python | Out of support scope | ||
Red Hat Enterprise Linux 7 | python3 | Out of support scope | ||
Red Hat Enterprise Linux 8 | python36:3.6/python36 | Not affected | ||
Red Hat Enterprise Linux 8 | python39:3.9/python39 | Not affected | ||
Red Hat Enterprise Linux 9 | python2.7 | Affected | ||
Red Hat Enterprise Linux 9 | python3.9 | Not affected | ||
Red Hat Enterprise Linux 7 | python | Fixed | RHSA-2022:5235 | 28.06.2022 |
Red Hat Enterprise Linux 8 | python3 | Fixed | RHSA-2021:1633 | 18.05.2021 |
Red Hat Enterprise Linux 8 | python27 | Fixed | RHSA-2021:1761 | 18.05.2021 |
Показывать по
Дополнительная информация
Статус:
EPSS
5.9 Medium
CVSS3
Связанные уязвимости
Python 3.x through 3.9.1 has a buffer overflow in PyCArg_repr in _ctypes/callproc.c, which may lead to remote code execution in certain Python applications that accept floating-point numbers as untrusted input, as demonstrated by a 1e300 argument to c_double.from_param. This occurs because sprintf is used unsafely.
Python 3.x through 3.9.1 has a buffer overflow in PyCArg_repr in _ctypes/callproc.c, which may lead to remote code execution in certain Python applications that accept floating-point numbers as untrusted input, as demonstrated by a 1e300 argument to c_double.from_param. This occurs because sprintf is used unsafely.
Python 3.x through 3.9.1 has a buffer overflow in PyCArg_repr in _ctyp ...
Python 3.x through 3.9.1 has a buffer overflow in PyCArg_repr in _ctypes/callproc.c, which may lead to remote code execution in certain Python applications that accept floating-point numbers as untrusted input, as demonstrated by a 1e300 argument to c_double.from_param. This occurs because sprintf is used unsafely.
EPSS
5.9 Medium
CVSS3