Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

SUSE-SU-2024:3958-1

Опубликовано: 08 нояб. 2024
Источник: suse-cvrf

Описание

Security update for python311

This update for python311 fixes the following issues:

  • CVE-2024-9287: Fixed quoted path names provided when creating a virtual environment (bsc#1232241).

Bug fixes:

  • Drop .pyc files from docdir for reproducible builds (bsc#1230906).

Список пакетов

Container containers/apache-pulsar:3.3
libpython3_11-1_0-3.11.10-150600.3.9.2
python311-base-3.11.10-150600.3.9.2
Container containers/open-webui:0
libpython3_11-1_0-3.11.10-150600.3.9.2
python311-3.11.10-150600.3.9.2
python311-base-3.11.10-150600.3.9.2
Container containers/python:3.11
libpython3_11-1_0-3.11.10-150600.3.9.2
python311-3.11.10-150600.3.9.2
python311-base-3.11.10-150600.3.9.2
python311-devel-3.11.10-150600.3.9.2
Container containers/pytorch:2-nvidia
libpython3_11-1_0-3.11.10-150600.3.9.2
python311-base-3.11.10-150600.3.9.2
Container containers/pytorch:2.5.0
libpython3_11-1_0-3.11.10-150600.3.9.2
python311-base-3.11.10-150600.3.9.2
Image SLES15-SP6-Azure-Basic
libpython3_11-1_0-3.11.10-150600.3.9.2
python311-3.11.10-150600.3.9.2
python311-base-3.11.10-150600.3.9.2
Image SLES15-SP6-Azure-Standard
libpython3_11-1_0-3.11.10-150600.3.9.2
python311-3.11.10-150600.3.9.2
python311-base-3.11.10-150600.3.9.2
Image SLES15-SP6-BYOS-Azure
libpython3_11-1_0-3.11.10-150600.3.9.2
python311-3.11.10-150600.3.9.2
python311-base-3.11.10-150600.3.9.2
Image SLES15-SP6-BYOS-EC2
libpython3_11-1_0-3.11.10-150600.3.9.2
python311-3.11.10-150600.3.9.2
python311-base-3.11.10-150600.3.9.2
Image SLES15-SP6-EC2
libpython3_11-1_0-3.11.10-150600.3.9.2
python311-3.11.10-150600.3.9.2
python311-base-3.11.10-150600.3.9.2
Image SLES15-SP6-EC2-ECS-HVM
libpython3_11-1_0-3.11.10-150600.3.9.2
python311-3.11.10-150600.3.9.2
python311-base-3.11.10-150600.3.9.2
Image SLES15-SP6-HPC
libpython3_11-1_0-3.11.10-150600.3.9.2
python311-3.11.10-150600.3.9.2
python311-base-3.11.10-150600.3.9.2
Image SLES15-SP6-HPC-Azure
libpython3_11-1_0-3.11.10-150600.3.9.2
python311-3.11.10-150600.3.9.2
python311-base-3.11.10-150600.3.9.2
Image SLES15-SP6-HPC-BYOS
libpython3_11-1_0-3.11.10-150600.3.9.2
python311-3.11.10-150600.3.9.2
python311-base-3.11.10-150600.3.9.2
Image SLES15-SP6-HPC-BYOS-Azure
libpython3_11-1_0-3.11.10-150600.3.9.2
python311-3.11.10-150600.3.9.2
python311-base-3.11.10-150600.3.9.2
Image SLES15-SP6-HPC-BYOS-EC2
libpython3_11-1_0-3.11.10-150600.3.9.2
python311-3.11.10-150600.3.9.2
python311-base-3.11.10-150600.3.9.2
Image SLES15-SP6-HPC-EC2
libpython3_11-1_0-3.11.10-150600.3.9.2
python311-3.11.10-150600.3.9.2
python311-base-3.11.10-150600.3.9.2
Image SLES15-SP6-Hardened-BYOS-Azure
libpython3_11-1_0-3.11.10-150600.3.9.2
python311-3.11.10-150600.3.9.2
python311-base-3.11.10-150600.3.9.2
Image SLES15-SP6-Hardened-BYOS-EC2
libpython3_11-1_0-3.11.10-150600.3.9.2
python311-3.11.10-150600.3.9.2
python311-base-3.11.10-150600.3.9.2
Image SLES15-SP6-SAP
libpython3_11-1_0-3.11.10-150600.3.9.2
python311-3.11.10-150600.3.9.2
python311-base-3.11.10-150600.3.9.2
Image SLES15-SP6-SAP-Azure
libpython3_11-1_0-3.11.10-150600.3.9.2
python311-3.11.10-150600.3.9.2
python311-base-3.11.10-150600.3.9.2
Image SLES15-SP6-SAP-BYOS-Azure
libpython3_11-1_0-3.11.10-150600.3.9.2
python311-3.11.10-150600.3.9.2
python311-base-3.11.10-150600.3.9.2
Image SLES15-SP6-SAP-BYOS-EC2
libpython3_11-1_0-3.11.10-150600.3.9.2
python311-3.11.10-150600.3.9.2
python311-base-3.11.10-150600.3.9.2
Image SLES15-SP6-SAP-EC2
libpython3_11-1_0-3.11.10-150600.3.9.2
python311-3.11.10-150600.3.9.2
python311-base-3.11.10-150600.3.9.2
Image SLES15-SP6-SAP-Hardened
libpython3_11-1_0-3.11.10-150600.3.9.2
python311-3.11.10-150600.3.9.2
python311-base-3.11.10-150600.3.9.2
Image SLES15-SP6-SAP-Hardened-Azure
libpython3_11-1_0-3.11.10-150600.3.9.2
python311-3.11.10-150600.3.9.2
python311-base-3.11.10-150600.3.9.2
Image SLES15-SP6-SAP-Hardened-BYOS
libpython3_11-1_0-3.11.10-150600.3.9.2
python311-3.11.10-150600.3.9.2
python311-base-3.11.10-150600.3.9.2
Image SLES15-SP6-SAP-Hardened-BYOS-Azure
libpython3_11-1_0-3.11.10-150600.3.9.2
python311-3.11.10-150600.3.9.2
python311-base-3.11.10-150600.3.9.2
Image SLES15-SP6-SAP-Hardened-BYOS-EC2
libpython3_11-1_0-3.11.10-150600.3.9.2
python311-3.11.10-150600.3.9.2
python311-base-3.11.10-150600.3.9.2
Image SLES15-SP6-SAP-Hardened-EC2
libpython3_11-1_0-3.11.10-150600.3.9.2
python311-3.11.10-150600.3.9.2
python311-base-3.11.10-150600.3.9.2
Image SLES15-SP6-SAPCAL
libpython3_11-1_0-3.11.10-150600.3.9.2
python311-3.11.10-150600.3.9.2
python311-base-3.11.10-150600.3.9.2
Image SLES15-SP6-SAPCAL-Azure
libpython3_11-1_0-3.11.10-150600.3.9.2
python311-3.11.10-150600.3.9.2
python311-base-3.11.10-150600.3.9.2
Image SLES15-SP6-SAPCAL-EC2
libpython3_11-1_0-3.11.10-150600.3.9.2
python311-3.11.10-150600.3.9.2
python311-base-3.11.10-150600.3.9.2
Image ai_15_6
libpython3_11-1_0-3.11.10-150600.3.9.2
python311-base-3.11.10-150600.3.9.2
SUSE Linux Enterprise Module for Basesystem 15 SP6
libpython3_11-1_0-3.11.10-150600.3.9.2
python311-base-3.11.10-150600.3.9.2
SUSE Linux Enterprise Module for Python 3 15 SP6
python311-3.11.10-150600.3.9.2
python311-curses-3.11.10-150600.3.9.2
python311-dbm-3.11.10-150600.3.9.2
python311-devel-3.11.10-150600.3.9.2
python311-idle-3.11.10-150600.3.9.2
python311-tk-3.11.10-150600.3.9.2
python311-tools-3.11.10-150600.3.9.2
openSUSE Leap 15.6
libpython3_11-1_0-3.11.10-150600.3.9.2
libpython3_11-1_0-32bit-3.11.10-150600.3.9.2
python311-3.11.10-150600.3.9.2
python311-32bit-3.11.10-150600.3.9.2
python311-base-3.11.10-150600.3.9.2
python311-base-32bit-3.11.10-150600.3.9.2
python311-curses-3.11.10-150600.3.9.2
python311-dbm-3.11.10-150600.3.9.2
python311-devel-3.11.10-150600.3.9.2
python311-doc-3.11.10-150600.3.9.3
python311-doc-devhelp-3.11.10-150600.3.9.3
python311-idle-3.11.10-150600.3.9.2
python311-testsuite-3.11.10-150600.3.9.2
python311-tk-3.11.10-150600.3.9.2
python311-tools-3.11.10-150600.3.9.2

Описание

A vulnerability has been found in the CPython `venv` module and CLI where path names provided when creating a virtual environment were not quoted properly, allowing the creator to inject commands into virtual environment "activation" scripts (ie "source venv/bin/activate"). This means that attacker-controlled virtual environments are able to run commands when the virtual environment is activated. Virtual environments which are not created by an attacker or which aren't activated before being used (ie "./venv/bin/python") are not affected.


Затронутые продукты
Container containers/apache-pulsar:3.3:libpython3_11-1_0-3.11.10-150600.3.9.2
Container containers/apache-pulsar:3.3:python311-base-3.11.10-150600.3.9.2
Container containers/open-webui:0:libpython3_11-1_0-3.11.10-150600.3.9.2
Container containers/open-webui:0:python311-3.11.10-150600.3.9.2

Ссылки
Уязвимость SUSE-SU-2024:3958-1