{"id":"UBUNTU-CVE-2019-19274","details":"typed_ast 1.3.0 and 1.3.1 has a handle_keywordonly_args out-of-bounds read. An attacker with the ability to cause a Python interpreter to parse Python source (but not necessarily execute it) may be able to crash the interpreter process. This could be a concern, for example, in a web-based service that parses (but does not execute) Python code. (This issue also affected certain Python 3.8.0-alpha prereleases.)","modified":"2025-10-24T04:48:01Z","published":"2019-11-26T15:15:00Z","upstream":["CVE-2019-19274"],"references":[{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2019-19274"},{"type":"REPORT","url":"https://bugs.python.org/issue36495"},{"type":"REPORT","url":"https://github.com/python/typed_ast/commit/156afcb26c198e162504a57caddfe0acd9ed7dce"},{"type":"REPORT","url":"https://github.com/python/typed_ast/commit/dc317ac9cff859aa84eeabe03fb5004982545b3b"},{"type":"REPORT","url":"https://github.com/python/cpython/commit/a4d78362397fc3bced6ea80fbc7b5f4827aec55e"},{"type":"REPORT","url":"https://github.com/python/cpython/commit/dcfcd146f8e6fc5c2fc16a4c192a0c5f5ca8c53c"},{"type":"REPORT","url":"https://www.cve.org/CVERecord?id=CVE-2019-19274"}],"affected":[{"package":{"name":"python3-typed-ast","ecosystem":"Ubuntu:18.04:LTS","purl":"pkg:deb/ubuntu/python3-typed-ast@1.1.0-1?arch=source&distro=bionic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["1.0.4-1build1","1.1.0-1"],"ecosystem_specific":{"binaries":[{"binary_name":"python3-typed-ast","binary_version":"1.1.0-1"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2019/UBUNTU-CVE-2019-19274.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]}