First published: Tue Nov 26 2019(Updated: )
typed_ast 1.3.0 and 1.3.1 has a handle_keywordonly_args out-of-bounds read. An attacker with the ability to cause a Python interpreter to parse Python source (but not necessarily execute it) may be able to crash the interpreter process. This could be a concern, for example, in a web-based service that parses (but does not execute) Python code. (This issue also affected certain Python 3.8.0-alpha prereleases.)
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Python Typed Ast | =1.3.0 | |
Python Typed Ast | =1.3.1 | |
pip/typed-ast | >=1.3.0<1.3.2 | 1.3.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-19274 has a moderate severity level due to the potential for crashing the Python interpreter.
To fix CVE-2019-19274, upgrade typed-ast to version 1.3.2 or later.
CVE-2019-19274 affects typed_ast versions 1.3.0 and 1.3.1.
CVE-2019-19274 is an out-of-bounds read vulnerability caused by incorrect handling of keyword-only arguments.
An attacker with the ability to send Python source code to the interpreter can exploit CVE-2019-19274.