PYSEC-2019-131

See a problem?
Import Source
https://github.com/pypa/advisory-database/blob/main/vulns/typed-ast/PYSEC-2019-131.yaml
JSON Data
https://api.test.osv.dev/v1/vulns/PYSEC-2019-131
Aliases
Published
2019-11-26T15:15:00Z
Modified
2023-11-01T04:50:48.709473Z
Summary
[none]
Details

typedast 1.3.0 and 1.3.1 has an astfor_arguments out-of-bounds read. An attacker with the ability to cause a Python interpreter to parse Python source (but not necessarily execute it) may be able to crash the interpreter process. This could be a concern, for example, in a web-based service that parses (but does not execute) Python code. (This issue also affected certain Python 3.8.0-alpha prereleases.)

References

Affected packages

PyPI / typed-ast

Package

Affected ranges

Type
GIT
Repo
https://github.com/python/typed_ast
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed
Fixed
Type
GIT
Repo
https://github.com/python/cpython
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed
Fixed
Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.3.2

Affected versions

0.*

0.5
0.5.1
0.5.2
0.5.3
0.5.4
0.5.5
0.5.6
0.6.0
0.6.1
0.6.2
0.6.3

1.*

1.0.0
1.0.1
1.0.2
1.0.3
1.0.4
1.1.0
1.1.1
1.1.2
1.2.0
1.3.0
1.3.1