CVE-2020-13091

NameCVE-2020-13091
Descriptionpandas through 1.0.3 can unserialize and execute commands from an untrusted file that is passed to the read_pickle() function, if __reduce__ makes an os.system call. NOTE: third parties dispute this issue because the read_pickle() function is documented as unsafe and it is the user's responsibility to use the function in a secure manner
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
pandas (PTS)jessie0.14.1-2vulnerable
stretch0.19.2-5.1vulnerable
buster0.23.3+dfsg-3vulnerable
bullseye1.1.5+dfsg-2vulnerable
bookworm1.5.3+dfsg-2vulnerable
sid, trixie2.2.3+dfsg-5vulnerable

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
pandassource(unstable)(unfixed)unimportant

Search for package or bug name: Reporting problems