First published: Wed Jan 20 2021(Updated: )
Python 3.x through 3.9.1 has a buffer overflow in PyCArg_repr in _ctypes/callproc.c, which may lead to remote code execution in certain Python applications that accept floating-point numbers as untrusted input. Reference: <a href="https://bugs.python.org/issue42938">https://bugs.python.org/issue42938</a> <a href="https://github.com/python/cpython/pull/24239">https://github.com/python/cpython/pull/24239</a>
Affected Software | Affected Version | How to fix |
---|---|---|
Python Babel Localedata | <=3.9.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1918168 is critical due to the potential for remote code execution.
To fix REDHAT-BUG-1918168, upgrade Python to version 3.9.2 or later.
The vulnerability in REDHAT-BUG-1918168 is caused by a buffer overflow in the PyCArg_repr function when handling untrusted floating-point input.
REDHAT-BUG-1918168 affects Python versions 3.9.1 and earlier.
Yes, REDHAT-BUG-1918168 can be exploited remotely if the application accepts untrusted floating-point numbers as input.