CVE: CVE-2021-3177 - python: Stack-based buffer overflow in PyCArg_repr in _ctypes/callproc.c
Bug #1987927 reported by
Joe Slater
This bug affects 1 person
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
StarlingX |
Fix Released
|
Medium
|
Joe Slater |
Bug Description
From NIST:
Python 3.x through 3.9.1 has a buffer overflow in PyCArg_repr in _ctypes/callproc.c, which may lead to remote code execution in certain Python applications that accept floating-point numbers as untrusted input, as demonstrated by a 1e300 argument to c_double.
The problem occurs for python2 as well. A specific example is a coredump when executing
>>> c_double.
CVE References
Changed in starlingx: | |
assignee: | nobody → Joe Slater (jslater0wind) |
tags: | added: stx.security |
information type: | Public → Public Security |
Changed in starlingx: | |
importance: | Undecided → Medium |
tags: | added: stx.8.0 |
summary: |
- CVE: CVE-2021-3177 - python + CVE: CVE-2021-3177 - python: Stack-based buffer overflow in PyCArg_repr + in _ctypes/callproc.c |
To post a comment you must log in.
Fix proposed to branch: master /review. opendev. org/c/starlingx /compile/ +/854851
Review: https:/