First published: Thu Nov 07 2019(Updated: )
A double free issue has been discovered in python-psutil because of the mishandling of refcounts while converting system data into Python objects in functions like psutil_disk_partitions(), psutil_users(), psutil_net_if_addrs(), and others. In particular cases, a local attacker may be able to get code execution by manipulating system resources that python-psutil then tries to convert.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/python-psutil | <0:5.4.3-11.el8 | 0:5.4.3-11.el8 |
redhat/python-psutil | <0:5.6.6-1.el7a | 0:5.6.6-1.el7a |
redhat/python-psutil | <0:5.7.2-2.el7 | 0:5.7.2-2.el7 |
redhat/rh-python38-python | <0:3.8.6-1.el7 | 0:3.8.6-1.el7 |
redhat/rh-python38-python-psutil | <0:5.6.4-5.el7 | 0:5.6.4-5.el7 |
redhat/rh-python38-python-urllib3 | <0:1.25.7-6.el7 | 0:1.25.7-6.el7 |
<=5.6.5 | ||
redhat/python-psutil | <5.6.6 | 5.6.6 |
Psutil Project Psutil | <=5.6.5 | |
debian/python-psutil | 5.8.0-1 5.9.4-1 5.9.8-2 | |
pip/psutil | <=5.6.5 | 5.6.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)