Описание
Security update for python311
This update for python311 fixes the following issues:
- CVE-2024-9287: Fixed quoted path names provided when creating a virtual environment (bsc#1232241).
Bug fixes:
- Drop .pyc files from docdir for reproducible builds (bsc#1230906).
Список пакетов
Container containers/apache-pulsar:3.3
libpython3_11-1_0-3.11.10-150600.3.9.2
python311-base-3.11.10-150600.3.9.2
Container containers/open-webui:0
libpython3_11-1_0-3.11.10-150600.3.9.2
python311-3.11.10-150600.3.9.2
python311-base-3.11.10-150600.3.9.2
Container containers/python:3.11
libpython3_11-1_0-3.11.10-150600.3.9.2
python311-3.11.10-150600.3.9.2
python311-base-3.11.10-150600.3.9.2
python311-devel-3.11.10-150600.3.9.2
Container containers/pytorch:2-nvidia
libpython3_11-1_0-3.11.10-150600.3.9.2
python311-base-3.11.10-150600.3.9.2
Container containers/pytorch:2.5.0
libpython3_11-1_0-3.11.10-150600.3.9.2
python311-base-3.11.10-150600.3.9.2
Image SLES15-SP6-Azure-Basic
libpython3_11-1_0-3.11.10-150600.3.9.2
python311-3.11.10-150600.3.9.2
python311-base-3.11.10-150600.3.9.2
Image SLES15-SP6-Azure-Standard
libpython3_11-1_0-3.11.10-150600.3.9.2
python311-3.11.10-150600.3.9.2
python311-base-3.11.10-150600.3.9.2
Image SLES15-SP6-BYOS-Azure
libpython3_11-1_0-3.11.10-150600.3.9.2
python311-3.11.10-150600.3.9.2
python311-base-3.11.10-150600.3.9.2
Image SLES15-SP6-BYOS-EC2
libpython3_11-1_0-3.11.10-150600.3.9.2
python311-3.11.10-150600.3.9.2
python311-base-3.11.10-150600.3.9.2
Image SLES15-SP6-EC2
libpython3_11-1_0-3.11.10-150600.3.9.2
python311-3.11.10-150600.3.9.2
python311-base-3.11.10-150600.3.9.2
Image SLES15-SP6-EC2-ECS-HVM
libpython3_11-1_0-3.11.10-150600.3.9.2
python311-3.11.10-150600.3.9.2
python311-base-3.11.10-150600.3.9.2
Image SLES15-SP6-HPC
libpython3_11-1_0-3.11.10-150600.3.9.2
python311-3.11.10-150600.3.9.2
python311-base-3.11.10-150600.3.9.2
Image SLES15-SP6-HPC-Azure
libpython3_11-1_0-3.11.10-150600.3.9.2
python311-3.11.10-150600.3.9.2
python311-base-3.11.10-150600.3.9.2
Image SLES15-SP6-HPC-BYOS
libpython3_11-1_0-3.11.10-150600.3.9.2
python311-3.11.10-150600.3.9.2
python311-base-3.11.10-150600.3.9.2
Image SLES15-SP6-HPC-BYOS-Azure
libpython3_11-1_0-3.11.10-150600.3.9.2
python311-3.11.10-150600.3.9.2
python311-base-3.11.10-150600.3.9.2
Image SLES15-SP6-HPC-BYOS-EC2
libpython3_11-1_0-3.11.10-150600.3.9.2
python311-3.11.10-150600.3.9.2
python311-base-3.11.10-150600.3.9.2
Image SLES15-SP6-HPC-EC2
libpython3_11-1_0-3.11.10-150600.3.9.2
python311-3.11.10-150600.3.9.2
python311-base-3.11.10-150600.3.9.2
Image SLES15-SP6-Hardened-BYOS-Azure
libpython3_11-1_0-3.11.10-150600.3.9.2
python311-3.11.10-150600.3.9.2
python311-base-3.11.10-150600.3.9.2
Image SLES15-SP6-Hardened-BYOS-EC2
libpython3_11-1_0-3.11.10-150600.3.9.2
python311-3.11.10-150600.3.9.2
python311-base-3.11.10-150600.3.9.2
Image SLES15-SP6-SAP
libpython3_11-1_0-3.11.10-150600.3.9.2
python311-3.11.10-150600.3.9.2
python311-base-3.11.10-150600.3.9.2
Image SLES15-SP6-SAP-Azure
libpython3_11-1_0-3.11.10-150600.3.9.2
python311-3.11.10-150600.3.9.2
python311-base-3.11.10-150600.3.9.2
Image SLES15-SP6-SAP-BYOS-Azure
libpython3_11-1_0-3.11.10-150600.3.9.2
python311-3.11.10-150600.3.9.2
python311-base-3.11.10-150600.3.9.2
Image SLES15-SP6-SAP-BYOS-EC2
libpython3_11-1_0-3.11.10-150600.3.9.2
python311-3.11.10-150600.3.9.2
python311-base-3.11.10-150600.3.9.2
Image SLES15-SP6-SAP-EC2
libpython3_11-1_0-3.11.10-150600.3.9.2
python311-3.11.10-150600.3.9.2
python311-base-3.11.10-150600.3.9.2
Image SLES15-SP6-SAP-Hardened
libpython3_11-1_0-3.11.10-150600.3.9.2
python311-3.11.10-150600.3.9.2
python311-base-3.11.10-150600.3.9.2
Image SLES15-SP6-SAP-Hardened-Azure
libpython3_11-1_0-3.11.10-150600.3.9.2
python311-3.11.10-150600.3.9.2
python311-base-3.11.10-150600.3.9.2
Image SLES15-SP6-SAP-Hardened-BYOS
libpython3_11-1_0-3.11.10-150600.3.9.2
python311-3.11.10-150600.3.9.2
python311-base-3.11.10-150600.3.9.2
Image SLES15-SP6-SAP-Hardened-BYOS-Azure
libpython3_11-1_0-3.11.10-150600.3.9.2
python311-3.11.10-150600.3.9.2
python311-base-3.11.10-150600.3.9.2
Image SLES15-SP6-SAP-Hardened-BYOS-EC2
libpython3_11-1_0-3.11.10-150600.3.9.2
python311-3.11.10-150600.3.9.2
python311-base-3.11.10-150600.3.9.2
Image SLES15-SP6-SAP-Hardened-EC2
libpython3_11-1_0-3.11.10-150600.3.9.2
python311-3.11.10-150600.3.9.2
python311-base-3.11.10-150600.3.9.2
Image SLES15-SP6-SAPCAL
libpython3_11-1_0-3.11.10-150600.3.9.2
python311-3.11.10-150600.3.9.2
python311-base-3.11.10-150600.3.9.2
Image SLES15-SP6-SAPCAL-Azure
libpython3_11-1_0-3.11.10-150600.3.9.2
python311-3.11.10-150600.3.9.2
python311-base-3.11.10-150600.3.9.2
Image SLES15-SP6-SAPCAL-EC2
libpython3_11-1_0-3.11.10-150600.3.9.2
python311-3.11.10-150600.3.9.2
python311-base-3.11.10-150600.3.9.2
Image ai_15_6
libpython3_11-1_0-3.11.10-150600.3.9.2
python311-base-3.11.10-150600.3.9.2
SUSE Linux Enterprise Module for Basesystem 15 SP6
libpython3_11-1_0-3.11.10-150600.3.9.2
python311-base-3.11.10-150600.3.9.2
SUSE Linux Enterprise Module for Python 3 15 SP6
python311-3.11.10-150600.3.9.2
python311-curses-3.11.10-150600.3.9.2
python311-dbm-3.11.10-150600.3.9.2
python311-devel-3.11.10-150600.3.9.2
python311-idle-3.11.10-150600.3.9.2
python311-tk-3.11.10-150600.3.9.2
python311-tools-3.11.10-150600.3.9.2
openSUSE Leap 15.6
libpython3_11-1_0-3.11.10-150600.3.9.2
libpython3_11-1_0-32bit-3.11.10-150600.3.9.2
python311-3.11.10-150600.3.9.2
python311-32bit-3.11.10-150600.3.9.2
python311-base-3.11.10-150600.3.9.2
python311-base-32bit-3.11.10-150600.3.9.2
python311-curses-3.11.10-150600.3.9.2
python311-dbm-3.11.10-150600.3.9.2
python311-devel-3.11.10-150600.3.9.2
python311-doc-3.11.10-150600.3.9.3
python311-doc-devhelp-3.11.10-150600.3.9.3
python311-idle-3.11.10-150600.3.9.2
python311-testsuite-3.11.10-150600.3.9.2
python311-tk-3.11.10-150600.3.9.2
python311-tools-3.11.10-150600.3.9.2
Ссылки
- Link for SUSE-SU-2024:3958-1
- E-Mail link for SUSE-SU-2024:3958-1
- SUSE Security Ratings
- SUSE Bug 1230906
- SUSE Bug 1232241
- SUSE CVE CVE-2024-9287 page
Описание
A vulnerability has been found in the CPython `venv` module and CLI where path names provided when creating a virtual environment were not quoted properly, allowing the creator to inject commands into virtual environment "activation" scripts (ie "source venv/bin/activate"). This means that attacker-controlled virtual environments are able to run commands when the virtual environment is activated. Virtual environments which are not created by an attacker or which aren't activated before being used (ie "./venv/bin/python") are not affected.
Затронутые продукты
Container containers/apache-pulsar:3.3:libpython3_11-1_0-3.11.10-150600.3.9.2
Container containers/apache-pulsar:3.3:python311-base-3.11.10-150600.3.9.2
Container containers/open-webui:0:libpython3_11-1_0-3.11.10-150600.3.9.2
Container containers/open-webui:0:python311-3.11.10-150600.3.9.2
Ссылки
- CVE-2024-9287
- SUSE Bug 1232241