typed-ast Out-of-bounds Read
High severity
GitHub Reviewed
Published
Dec 2, 2019
to the GitHub Advisory Database
•
Updated Sep 5, 2023
Description
Reviewed
Nov 27, 2019
Published to the GitHub Advisory Database
Dec 2, 2019
Last updated
Sep 5, 2023
typed_ast 1.3.0 and 1.3.1 has an ast_for_arguments out-of-bounds read. An attacker with the ability to cause a Python interpreter to parse Python source (but not necessarily execute it) may be able to crash the interpreter process. This could be a concern, for example, in a web-based service that parses (but does not execute) Python code. (This issue also affected certain Python 3.8.0-alpha prereleases.)
References