CVE-2020-10735

NameCVE-2020-10735
DescriptionA flaw was found in python. In algorithms with quadratic time complexity using non-binary bases, when using int("text"), a system could take 50ms to parse an int string with 100,000 digits and 5s for 1,000,000 digits (float, decimal, int.from_bytes(), and int() for binary bases 2, 4, 8, 16, and 32 are not affected). The highest threat from this vulnerability is to system availability.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
python3.10 (PTS)bookworm3.10.7-1fixed
sid3.10.7-2fixed
python3.11 (PTS)bookworm3.11.0~rc2-1fixed
sid3.11.0~rc2-2fixed
python3.7 (PTS)buster3.7.3-2+deb10u3vulnerable
python3.9 (PTS)bullseye3.9.2-1vulnerable
sid3.9.13-1vulnerable

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
python3.10source(unstable)3.10.7-1
python3.11source(unstable)3.11.0~rc2-1
python3.7source(unstable)(unfixed)
python3.9source(unstable)(unfixed)

Notes

[bullseye] - python3.9 <no-dsa> (Minor issue)
[buster] - python3.7 <postponed> (Minor issue, CPU DoS)
https://github.com/python/cpython/issues/95778
https://github.com/python/cpython/pull/96499
https://github.com/python/cpython/commit/f8b71da9aac6ea74808dcdd0cc266e705431356b (v3.11.0rc2)
https://github.com/python/cpython/commit/8f0fa4bd10aba723aff988720cd26b93be99bc12 (v3.10.7)
https://github.com/python/cpython/commit/cec1e9dfd769bd3a16142d0fdd1a36f19c77ed15 (v3.9.14)
https://github.com/python/cpython/commit/15ec1afd4fcd2da1e2d2b256c562fb42d8d886a2 (v3.7.14)

Search for package or bug name: Reporting problems