Skip to content

Commit 791f5aa

Browse files
committed
updating CVE number
1 parent a6aafea commit 791f5aa

8 files changed

Lines changed: 8 additions & 8 deletions

File tree

AUTHORS.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -76,4 +76,4 @@ Authors in order of the timeline of their contributions:
7676
- [Jim Cipar](https://github.com/jcipar) for the fix recursion depth limit when hashing numpy.datetime64
7777
- [Enji Cooper](https://github.com/ngie-eign) for converting legacy setuptools use to pyproject.toml
7878
- [Diogo Correia](https://github.com/diogotcorreia) for reporting security vulnerability in Delta and DeepDiff that could allow remote code execution.
79-
- [am-periphery](https://github.com/am-periphery) for reporting CVE-2025-58367: denial-of-service via crafted pickle payloads triggering massive memory allocation.
79+
- [am-periphery](https://github.com/am-periphery) for reporting CVE-2026-33155: denial-of-service via crafted pickle payloads triggering massive memory allocation.

CHANGELOG.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
# DeepDiff Change log
22

33
- v8-6-2
4-
- Security fix (CVE-2025-58367): Prevent denial-of-service via crafted pickle payloads that trigger massive memory allocation through the REDUCE opcode. Size-sensitive callables like `bytes()` and `bytearray()` are now wrapped to reject allocations exceeding 128 MB.
4+
- Security fix (CVE-2026-33155): Prevent denial-of-service via crafted pickle payloads that trigger massive memory allocation through the REDUCE opcode. Size-sensitive callables like `bytes()` and `bytearray()` are now wrapped to reject allocations exceeding 128 MB.
55

66
- v8-6-1
77
- Patched security vulnerability in the Delta class which was vulnerable to class pollution via its constructor, and when combined with a gadget available in DeltaDiff itself, it could lead to Denial of Service and Remote Code Execution (via insecure Pickle deserialization).

README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -24,7 +24,7 @@ Tested on Python 3.9+ and PyPy3.
2424
Please check the [ChangeLog](CHANGELOG.md) file for the detailed information.
2525

2626
DeepDiff 8-6-2
27-
- **Security (CVE-2025-58367):** Fixed a memory exhaustion DoS vulnerability in `_RestrictedUnpickler` by limiting the maximum allocation size for `bytes` and `bytearray` during deserialization.
27+
- **Security (CVE-2026-33155):** Fixed a memory exhaustion DoS vulnerability in `_RestrictedUnpickler` by limiting the maximum allocation size for `bytes` and `bytearray` during deserialization.
2828

2929
DeepDiff 8-6-1
3030
- Patched security vulnerability in the Delta class which was vulnerable to class pollution via its constructor, and when combined with a gadget available in DeltaDiff itself, it could lead to Denial of Service and Remote Code Execution (via insecure Pickle deserialization).

deepdiff/serialization.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -333,7 +333,7 @@ def pretty(self, prefix: Optional[Union[str, Callable]]=None):
333333

334334
# Maximum size allowed for integer arguments to constructors that allocate
335335
# memory proportional to the argument (e.g. bytes(n), bytearray(n)).
336-
# This prevents denial-of-service via crafted pickle payloads. (CVE-2025-58367)
336+
# This prevents denial-of-service via crafted pickle payloads. (CVE-2026-33155)
337337
_MAX_ALLOC_SIZE = 128 * 1024 * 1024 # 128 MB
338338

339339
# Callables where an integer argument directly controls memory allocation size.

docs/authors.rst

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -118,7 +118,7 @@ and polars support.
118118
- `Enji Cooper <https://github.com/ngie-eign>`__ for converting legacy
119119
setuptools use to pyproject.toml
120120
- `Diogo Correia <https://github.com/diogotcorreia>`__ for reporting security vulnerability in Delta and DeepDiff that could allow remote code execution.
121-
- `am-periphery <https://github.com/am-periphery>`__ for reporting CVE-2025-58367: denial-of-service via crafted pickle payloads triggering massive memory allocation.
121+
- `am-periphery <https://github.com/am-periphery>`__ for reporting CVE-2026-33155: denial-of-service via crafted pickle payloads triggering massive memory allocation.
122122

123123

124124
.. _Sep Dehpour (Seperman): http://www.zepworks.com

docs/changelog.rst

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ Changelog
66
DeepDiff Changelog
77

88
- v8-6-2
9-
- Security fix (CVE-2025-58367): Prevent denial-of-service via crafted pickle payloads that trigger massive memory allocation through the REDUCE opcode. Size-sensitive callables like ``bytes()`` and ``bytearray()`` are now wrapped to reject allocations exceeding 128 MB.
9+
- Security fix (CVE-2026-33155): Prevent denial-of-service via crafted pickle payloads that trigger massive memory allocation through the REDUCE opcode. Size-sensitive callables like ``bytes()`` and ``bytearray()`` are now wrapped to reject allocations exceeding 128 MB.
1010

1111
- v8-6-1
1212
- Patched security vulnerability in the Delta class which was vulnerable to class pollution via its constructor, and when combined with a gadget available in DeltaDiff itself, it could lead to Denial of Service and Remote Code Execution (via insecure Pickle deserialization).

docs/index.rst

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -34,7 +34,7 @@ What Is New
3434
DeepDiff 8-6-2
3535
--------------
3636

37-
- Security fix (CVE-2025-58367): Prevent denial-of-service via crafted pickle payloads that trigger massive memory allocation through the REDUCE opcode. Size-sensitive callables like ``bytes()`` and ``bytearray()`` are now wrapped to reject allocations exceeding 128 MB.
37+
- Security fix (CVE-2026-33155): Prevent denial-of-service via crafted pickle payloads that trigger massive memory allocation through the REDUCE opcode. Size-sensitive callables like ``bytes()`` and ``bytearray()`` are now wrapped to reject allocations exceeding 128 MB.
3838

3939
DeepDiff 8-6-1
4040
--------------

tests/test_serialization.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -159,7 +159,7 @@ class TestPicklingSecurity:
159159

160160
@pytest.mark.skipif(sys.platform == "win32", reason="Resource module is Unix-only")
161161
def test_restricted_unpickler_memory_exhaustion_cve(self):
162-
"""CVE-2025-58367: Prevent DoS via massive allocation through REDUCE opcode.
162+
"""CVE-2026-33155: Prevent DoS via massive allocation through REDUCE opcode.
163163
164164
The payload calls bytes(10_000_000_000) which is allowed by find_class
165165
but would allocate ~9.3GB of memory. The fix should reject this before

0 commit comments

Comments
 (0)