Modules/_pickle.c in Python before 3.7.1 has an integer overflow via a large LONG_BINPUT value that is mishandled during a "resize to twice the size" attempt. This issue might cause memory exhaustion, but is only relevant if the pickle format is used for serializing tens or hundreds of gigabytes of data. Upstream Issue: https://bugs.python.org/issue34656 Upstream Patch: https://github.com/python/cpython/commit/a4ae828ee416a66d8c7bf5ee71d653c2cc6a26dd Reference: http://people.canonical.com/~ubuntu-security/cve/2018/CVE-2018-20406.html
Created python3 tracking bugs for this issue: Affects: fedora-all [bug 1664510] Created python33 tracking bugs for this issue: Affects: fedora-28 [bug 1664515] Created python34 tracking bugs for this issue: Affects: epel-all [bug 1664516] Affects: fedora-all [bug 1664511] Created python35 tracking bugs for this issue: Affects: fedora-all [bug 1664512] Created python36 tracking bugs for this issue: Affects: epel-7 [bug 1664517] Affects: fedora-29 [bug 1664513] Created python37 tracking bugs for this issue: Affects: fedora-28 [bug 1664514]
Statement: This issue did not affect the versions of python as shipped with Red Hat Enterprise Linux 5, 6 and 7.
External References: https://python-security.readthedocs.io/vuln/pickle-load-dos.html
This issue has been addressed in the following products: Red Hat Software Collections for Red Hat Enterprise Linux 7 Red Hat Software Collections for Red Hat Enterprise Linux 7.5 EUS Red Hat Software Collections for Red Hat Enterprise Linux 7.6 EUS Red Hat Software Collections for Red Hat Enterprise Linux 7.7 EUS Red Hat Software Collections for Red Hat Enterprise Linux 6 Via RHSA-2019:3725 https://access.redhat.com/errata/RHSA-2019:3725
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2018-20406