Christian Heimes <li...@cheimes.de> added the comment:

That line in Ray Project is a potential arbitrary code execution vulnerability. 
If an attacker is able to inject a custom pickle stream, then they can easily 
take over the service. Please report the issue to the project. It might be a 
simple score of a CVE for you.

Python has several functions and modules that are not designed to deal with 
malicious data. They are documented as insecure. The pickle format was created 
25 years ago. It's a useful serialization format but it's inherently insecure.

tl;dr we welcome any and all work to make Python more secure, but we cannot 
make very part of the interpreter secure. Pickle and marshal are two modules 
that you should ignore.

----------

_______________________________________
Python tracker <rep...@bugs.python.org>
<https://bugs.python.org/issue41208>
_______________________________________
_______________________________________________
Python-bugs-list mailing list
Unsubscribe: 
https://mail.python.org/mailman/options/python-bugs-list/archive%40mail-archive.com

Reply via email to