Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2019-19274

Опубликовано: 26 нояб. 2019
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 5
CVSS3: 7.5

Описание

typed_ast 1.3.0 and 1.3.1 has a handle_keywordonly_args out-of-bounds read. An attacker with the ability to cause a Python interpreter to parse Python source (but not necessarily execute it) may be able to crash the interpreter process. This could be a concern, for example, in a web-based service that parses (but does not execute) Python code. (This issue also affected certain Python 3.8.0-alpha prereleases.)

РелизСтатусПримечание
bionic

ignored

end of standard support, was needs-triage
devel

DNE

disco

ignored

end of life
eoan

not-affected

1.4.0-1
esm-apps/bionic

needs-triage

esm-apps/focal

not-affected

esm-apps/jammy

not-affected

esm-infra-legacy/trusty

DNE

focal

not-affected

groovy

not-affected

Показывать по

EPSS

Процентиль: 80%
0.0136
Низкий

5 Medium

CVSS2

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 7.5
nvd
около 6 лет назад

typed_ast 1.3.0 and 1.3.1 has a handle_keywordonly_args out-of-bounds read. An attacker with the ability to cause a Python interpreter to parse Python source (but not necessarily execute it) may be able to crash the interpreter process. This could be a concern, for example, in a web-based service that parses (but does not execute) Python code. (This issue also affected certain Python 3.8.0-alpha prereleases.)

CVSS3: 7.5
debian
около 6 лет назад

typed_ast 1.3.0 and 1.3.1 has a handle_keywordonly_args out-of-bounds ...

CVSS3: 7.5
github
около 6 лет назад

typed-ast Out-of-bounds Read

suse-cvrf
почти 6 лет назад

Security update for python-typed-ast

EPSS

Процентиль: 80%
0.0136
Низкий

5 Medium

CVSS2

7.5 High

CVSS3