CVE-2020-13091

NameCVE-2020-13091
Descriptionpandas through 1.0.3 can unserialize and execute commands from an untrusted file that is passed to the read_pickle() function, if __reduce__ makes an os.system call. NOTE: third parties dispute this issue because the read_pickle() function is documented as unsafe and it is the user's responsibility to use the function in a secure manner
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
pandas (PTS)buster0.23.3+dfsg-3vulnerable
bullseye1.1.5+dfsg-2vulnerable
bookworm1.5.3+dfsg-2vulnerable
trixie2.1.4+dfsg-5vulnerable
sid2.1.4+dfsg-7vulnerable

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
pandassource(unstable)(unfixed)unimportant

Search for package or bug name: Reporting problems