Bug 2328744
Summary: | CVE-2024-53899 uv: potential command injection via virtual environment activation scripts [fedora-39] | ||
---|---|---|---|
Product: | [Fedora] Fedora | Reporter: | Robb Gatica <rgatica> |
Component: | uv | Assignee: | Ben Beasley <code> |
Status: | CLOSED WONTFIX | QA Contact: | |
Severity: | high | Docs Contact: | |
Priority: | high | ||
Version: | 39 | CC: | code, mhroncok, python-packagers-sig, rust-sig |
Target Milestone: | --- | Keywords: | Security, SecurityTracking |
Target Release: | --- | ||
Hardware: | Unspecified | ||
OS: | Unspecified | ||
Whiteboard: | {"flaws": ["c17fbeb3-1b5d-4cbf-a55e-4ee1628b9bdc"]} | ||
Fixed In Version: | Doc Type: | No Doc Update | |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | 2024-11-25 20:00:26 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | |||
Bug Blocks: | 2328554 |
Description
Robb Gatica
2024-11-25 18:48:44 UTC
I was able to reproduce this in uv 0.5.2 and earlier. It appears to be fixed or mitigated in uv 0.5.3 and later. I have asked upstream to comment on whether they believe the issue is entirely dealt with, or whether there is further work to be done, in “Please comment on CVE-2024-53899 and virtualenv activation scripts,” https://github.com/astral-sh/uv/issues/9424. In any case, uv 0.4.30 as currently shipped in Fedora 39 *is* affected by this issue. However, Fedora 39 is one day from its end-of-life date, so it is too late to fix this. |