Bug 2328745
| Summary: | CVE-2024-53899 uv: potential command injection via virtual environment activation scripts [fedora-40] | ||
|---|---|---|---|
| Product: | [Fedora] Fedora | Reporter: | Robb Gatica <rgatica> |
| Component: | uv | Assignee: | Ben Beasley <code> |
| Status: | CLOSED ERRATA | QA Contact: | |
| Severity: | high | Docs Contact: | |
| Priority: | high | ||
| Version: | 40 | CC: | code, mhroncok, python-packagers-sig, rust-sig |
| Target Milestone: | --- | Keywords: | Security, SecurityTracking |
| Target Release: | --- | ||
| Hardware: | Unspecified | ||
| OS: | Unspecified | ||
| Whiteboard: | {"flaws": ["c17fbeb3-1b5d-4cbf-a55e-4ee1628b9bdc"]} | ||
| Fixed In Version: | uv-0.5.5-2.fc40 | Doc Type: | No Doc Update |
| Doc Text: | Story Points: | --- | |
| Clone Of: | Environment: | ||
| Last Closed: | 2024-12-07 06:06:27 UTC | Type: | --- |
| Regression: | --- | Mount Type: | --- |
| Documentation: | --- | CRM: | |
| Verified Versions: | Category: | --- | |
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
| Cloudforms Team: | --- | Target Upstream Version: | |
| Embargoed: | |||
| Bug Depends On: | |||
| Bug Blocks: | 2328554 | ||
|
Description
Robb Gatica
2024-11-25 18:48:48 UTC
I was able to reproduce this in uv 0.5.2 and earlier. It appears to be fixed or mitigated in uv 0.5.3 and later. I have asked upstream to comment on whether they believe the issue is entirely dealt with, or whether there is further work to be done, in “Please comment on CVE-2024-53899 and virtualenv activation scripts,” https://github.com/astral-sh/uv/issues/9424. In any case, uv 0.4.30 as currently shipped in Fedora 40 *is* affected by this issue. I will investigate whether a mitigation can be backported, or whether it makes sense to quickly ship an update to 0.5.3 or later to stable releases instead. FEDORA-2024-075f626765 (uv-0.5.4-2.fc40) has been submitted as an update to Fedora 40. https://bodhi.fedoraproject.org/updates/FEDORA-2024-075f626765 FEDORA-2024-075f626765 has been pushed to the Fedora 40 testing repository. Soon you'll be able to install the update with the following command: `sudo dnf upgrade --enablerepo=updates-testing --refresh --advisory=FEDORA-2024-075f626765` You can provide feedback for this update here: https://bodhi.fedoraproject.org/updates/FEDORA-2024-075f626765 See also https://fedoraproject.org/wiki/QA:Updates_Testing for more information on how to test updates. FEDORA-2024-075f626765 has been pushed to the Fedora 40 testing repository. Soon you'll be able to install the update with the following command: `sudo dnf upgrade --enablerepo=updates-testing --refresh --advisory=FEDORA-2024-075f626765` You can provide feedback for this update here: https://bodhi.fedoraproject.org/updates/FEDORA-2024-075f626765 See also https://fedoraproject.org/wiki/QA:Updates_Testing for more information on how to test updates. FEDORA-2024-075f626765 (uv-0.5.5-2.fc40) has been pushed to the Fedora 40 stable repository. If problem still persists, please make note of it in this bug report. |