Bug 1664509 (CVE-2018-20406) - CVE-2018-20406 python: Integer overflow in Modules/_pickle.c allows for memory exhaustion if serializing gigabytes of data
Summary: CVE-2018-20406 python: Integer overflow in Modules/_pickle.c allows for memor...
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2018-20406
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
low
low
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 1664510 1664511 1664512 1664513 1664514 1664515 1664516 1664517 1670062 1670063 1670064 1670065 1670066 1709350
Blocks: 1664518
TreeView+ depends on / blocked
 
Reported: 2019-01-09 03:46 UTC by Sam Fowler
Modified: 2024-08-09 12:53 UTC (History)
6 users (show)

Fixed In Version: python 3.7.1
Doc Type: If docs needed, set a value
Doc Text:
Clone Of:
Environment:
Last Closed: 2019-11-06 12:51:09 UTC
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2019:3725 0 None None None 2019-11-06 09:45:16 UTC

Description Sam Fowler 2019-01-09 03:46:05 UTC
Modules/_pickle.c in Python before 3.7.1 has an integer overflow via a large LONG_BINPUT value that is mishandled during a "resize to twice the size" attempt. This issue might cause memory exhaustion, but is only relevant if the pickle format is used for serializing tens or hundreds of gigabytes of data.


Upstream Issue:

https://bugs.python.org/issue34656


Upstream Patch:

https://github.com/python/cpython/commit/a4ae828ee416a66d8c7bf5ee71d653c2cc6a26dd


Reference:

http://people.canonical.com/~ubuntu-security/cve/2018/CVE-2018-20406.html

Comment 1 Sam Fowler 2019-01-09 03:46:50 UTC
Created python3 tracking bugs for this issue:

Affects: fedora-all [bug 1664510]


Created python33 tracking bugs for this issue:

Affects: fedora-28 [bug 1664515]


Created python34 tracking bugs for this issue:

Affects: epel-all [bug 1664516]
Affects: fedora-all [bug 1664511]


Created python35 tracking bugs for this issue:

Affects: fedora-all [bug 1664512]


Created python36 tracking bugs for this issue:

Affects: epel-7 [bug 1664517]
Affects: fedora-29 [bug 1664513]


Created python37 tracking bugs for this issue:

Affects: fedora-28 [bug 1664514]

Comment 3 Adam Mariš 2019-02-12 13:56:29 UTC
Statement:

This issue did not affect the versions of python as shipped with Red Hat Enterprise Linux 5, 6 and 7.

Comment 4 Adam Mariš 2019-02-12 13:56:31 UTC
External References:

https://python-security.readthedocs.io/vuln/pickle-load-dos.html

Comment 5 errata-xmlrpc 2019-11-06 09:45:15 UTC
This issue has been addressed in the following products:

  Red Hat Software Collections for Red Hat Enterprise Linux 7
  Red Hat Software Collections for Red Hat Enterprise Linux 7.5 EUS
  Red Hat Software Collections for Red Hat Enterprise Linux 7.6 EUS
  Red Hat Software Collections for Red Hat Enterprise Linux 7.7 EUS
  Red Hat Software Collections for Red Hat Enterprise Linux 6

Via RHSA-2019:3725 https://access.redhat.com/errata/RHSA-2019:3725

Comment 6 Product Security DevOps Team 2019-11-06 12:51:09 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2018-20406


Note You need to log in before you can comment on or make changes to this bug.