[Bugs] [Bug 13543] New: [CVE 21] ipython 7.34.0 CVEs found

bugzilla bugzilla на rosalinux.ru
Ср Авг 23 23:20:52 MSK 2023


https://bugzilla.rosalinux.ru/show_bug.cgi?id=13543

          Platform: 2021.1
            Bug ID: 13543
           Summary: [CVE 21] ipython 7.34.0  CVEs found
    Classification: ROSA-based products
           Product: ROSA Fresh
           Version: All
          Hardware: All
               URL: CVE-2023-24816,
                OS: Linux
            Status: CONFIRMED
          Severity: normal
          Priority: Normal
         Component: System (kernel, glibc, systemd, bash, PAM...)
          Assignee: bugs на lists.rosalinux.ru
          Reporter: y.tumanov на rosalinux.ru
        QA Contact: bugs на lists.rosalinux.ru
                CC: e.kosachev на rosalinux.ru, s.matveev на rosalinux.ru,
                    y.tumanov на rosalinux.ru
  Target Milestone: ---
             Flags: secteam_verified?

Please patch CVEs for package ipython version 7.34.0

INFO (CVEs are): ipython 7.34.0
 cves found
CVE-2023-24816
Desc: IPython (Interactive Python) is a command shell for interactive computing
in multiple programming languages, originally developed for the Python
programming language. Versions prior to 8.1.0 are subject to a command
injection vulnerability with very specific prerequisites. This vulnerability
requires that the function `IPython.utils.terminal.set_term_title` be called on
Windows in a Python environment where ctypes is not available. The dependency
on `ctypes` in `IPython.utils._process_win32` prevents the vulnerable code from
ever being reached in the ipython binary. However, as a library that could be
used by another tool `set_term_title` could be called and hence introduce a
vulnerability. Should an attacker get untrusted input to an instance of this
function they would be able to inject shell commands as current process and
limited to the scope of the current process. Users of ipython as a library are
advised to upgrade. Users unable to upgrade should ensure that any calls to the
`IPython.utils.terminal.set_term_title` function are done with trusted or
filtered input.
Link: https://nvd.nist.gov/vuln/detail/CVE-2023-24816
Severity: HIGH

-- 
You are receiving this mail because:
You are the QA Contact for the bug.
You are the assignee for the bug.
----------- следущая часть -----------
Вложение в формате HTML было извлечено…
URL: <http://lists.rosalinux.ru/pipermail/bugs/attachments/20230823/8b86c687/attachment.html>


Подробная информация о списке рассылки Bugs