First published: Mon May 11 2020(Updated: )
Python is vulnerable to a denial of service, caused by the failure to limit amount of digits converting text to int by the int() type in PyLong_FromString(). A remote attacker could exploit this vulnerability to consume all available resources.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/python3 | <0:3.6.8-48.el8_7.1 | 0:3.6.8-48.el8_7.1 |
redhat/python3.9 | <0:3.9.10-3.el9_0 | 0:3.9.10-3.el9_0 |
redhat/rh-python38-python | <0:3.8.14-1.el7 | 0:3.8.14-1.el7 |
Python Python | >=3.7.0<3.7.14 | |
Python Python | >=3.8.0<3.8.14 | |
Python Python | >=3.9.0<3.9.14 | |
Python Python | >=3.10.0<3.10.7 | |
Python Python | =3.11.0-alpha1 | |
Python Python | =3.11.0-alpha2 | |
Python Python | =3.11.0-alpha3 | |
Python Python | =3.11.0-alpha4 | |
Python Python | =3.11.0-alpha5 | |
Python Python | =3.11.0-alpha6 | |
Python Python | =3.11.0-alpha7 | |
Python Python | =3.11.0-beta1 | |
Python Python | =3.11.0-beta2 | |
Python Python | =3.11.0-beta3 | |
Python Python | =3.11.0-beta4 | |
Python Python | =3.11.0-beta5 | |
Python Python | =3.11.0-rc1 | |
Redhat Quay | =3.0.0 | |
Redhat Software Collections | ||
Fedoraproject Fedora | =35 | |
Fedoraproject Fedora | =36 | |
Fedoraproject Fedora | =37 | |
Redhat Enterprise Linux | =8.0 | |
IBM Cloud Pak for Security | <=1.10.0.0 - 1.10.11.0 | |
IBM QRadar Suite Software | <=1.10.12.0 - 1.10.16.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
The vulnerability ID of this flaw in python is CVE-2020-10735.
The severity of CVE-2020-10735 is high (7.5).
Versions 3.7.0 to 3.7.14, 3.8.0 to 3.8.14, and 3.9.0 to 3.9.14 of Python are affected by CVE-2020-10735.
To fix CVE-2020-10735, you should update Python to version 3.6.8-48.el8_7.1, 3.9.10-3.el9_0, or 3.8.14-1.el7 (depending on your operating system).
You can find more information about CVE-2020-10735 on the Red Hat Bugzilla website: [Link](https://bugzilla.redhat.com/show_bug.cgi/show_bug.cgi?id=2124161).