Bug 2240651 (CVE-2023-41419)
| Summary: | CVE-2023-41419 python-gevent: privilege escalation via a crafted script to the WSGIServer component | ||
|---|---|---|---|
| Product: | [Other] Security Response | Reporter: | Guilherme de Almeida Suckevicz <gsuckevi> | 
| Component: | vulnerability | Assignee: | Product Security <prodsec-ir-bot> | 
| Status: | NEW --- | QA Contact: | |
| Severity: | high | Docs Contact: | |
| Priority: | high | ||
| Version: | unspecified | CC: | bdettelb, dfreiber, eglynn, enothen, hkataria, jburrell, jjoyce, jjung, jschluet, juneau, kaycoth, kshier, lhh, lsvaty, mburns, mgarciac, pgrist, prodsec-ir-bot, rhos-maint, rogbas, saroy, vkumar, vsroka | 
| Target Milestone: | --- | Keywords: | Security | 
| Target Release: | --- | ||
| Hardware: | All | ||
| OS: | Linux | ||
| Whiteboard: | |||
| Fixed In Version: | gevent 23.9.1 | Doc Type: | If docs needed, set a value | 
| Doc Text: | 
       A flaw was found in python-event, which could allow a remote attacker to gain elevated privileges on the system, caused by a flaw in the WSGIServer component. By using a specially crafted script, an attacker can gain elevated privileges. 
 | 
        
        
        
        Story Points: | --- | 
| Clone Of: | Environment: | ||
| Last Closed: | Type: | --- | |
| Regression: | --- | Mount Type: | --- | 
| Documentation: | --- | CRM: | |
| Verified Versions: | Category: | --- | |
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
| Cloudforms Team: | --- | Target Upstream Version: | |
| Embargoed: | |||
| Bug Depends On: | 2240653, 2240654, 2242244, 2253616, 2253617 | ||
| Bug Blocks: | 2240652 | ||
| 
 
        
          Description
        
        
          Guilherme de Almeida Suckevicz
        
        
        
        
        
          2023-09-25 18:25:35 UTC
        
       
      
      
      
    Created python-gevent tracking bugs for this issue: Affects: fedora-all [bug 2242244] This issue has been addressed in the following products: Red Hat OpenStack Platform 17.1 Via RHSA-2023:7438 https://access.redhat.com/errata/RHSA-2023:7438 This issue has been addressed in the following products: Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions Red Hat Enterprise Linux 8.6 Telecommunications Update Service Via RHSA-2024:7421 https://access.redhat.com/errata/RHSA-2024:7421 This issue has been addressed in the following products: Red Hat Enterprise Linux 8.2 Advanced Update Support Via RHSA-2024:7785 https://access.redhat.com/errata/RHSA-2024:7785 This issue has been addressed in the following products: Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions Red Hat Enterprise Linux 8.4 Telecommunications Update Service Via RHSA-2024:8105 https://access.redhat.com/errata/RHSA-2024:8105 This issue has been addressed in the following products: Red Hat Enterprise Linux 8.8 Extended Update Support Via RHSA-2024:8102 https://access.redhat.com/errata/RHSA-2024:8102 This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2024:8834 https://access.redhat.com/errata/RHSA-2024:8834  |