Improper Input Validation Affecting platform-python package, versions <0:3.6.8-31.el8
Snyk CVSS
Attack Complexity
Low
Availability
High
Threat Intelligence
EPSS
1.11% (85th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-CENTOS8-PLATFORMPYTHON-2056176
- published 26 Jul 2021
- disclosed 10 Dec 2019
How to fix?
Upgrade Centos:8
platform-python
to version 0:3.6.8-31.el8 or higher.
NVD Description
Note: Versions mentioned in the description apply only to the upstream platform-python
package and not the platform-python
package as distributed by Centos
.
See How to fix?
for Centos:8
relevant fixed versions and status.
In Lib/tarfile.py in Python through 3.8.3, an attacker is able to craft a TAR archive leading to an infinite loop when opened by tarfile.open, because _proc_pax lacks header validation.
References
- CONFIRM
- CONFIRM
- CONFIRM
- CVE-2019-20907
- FEDORA
- FEDORA
- FEDORA
- FEDORA
- FEDORA
- FEDORA
- FEDORA
- FEDORA
- FEDORA
- FEDORA
- FEDORA
- FEDORA
- FEDORA
- FEDORA
- GENTOO
- MISC
- MLIST
- MLIST
- RHSA-2020:4433
- SUSE
- SUSE
- SUSE
- SUSE
- UBUNTU
- cve@mitre.org
- cve@mitre.org
- cve@mitre.org
- cve@mitre.org
- cve@mitre.org
- cve@mitre.org
- cve@mitre.org
- cve@mitre.org
- cve@mitre.org
- cve@mitre.org
- cve@mitre.org
- cve@mitre.org
- cve@mitre.org
- cve@mitre.org
- cve@mitre.org