Untrusted Search Path Affecting python3.11-devel package, versions <0:3.11.5-1.el9_3
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-ALMALINUX9-PYTHON311DEVEL-6060666
- published 15 Nov 2023
- disclosed 7 Nov 2023
Introduced: 7 Nov 2023
CVE-2023-41105 Open this link in a new tabHow to fix?
Upgrade AlmaLinux:9
python3.11-devel
to version 0:3.11.5-1.el9_3 or higher.
This issue was patched in ALSA-2023:6494
.
NVD Description
Note: Versions mentioned in the description apply only to the upstream python3.11-devel
package and not the python3.11-devel
package as distributed by AlmaLinux
.
See How to fix?
for AlmaLinux:9
relevant fixed versions and status.
An issue was discovered in Python 3.11 through 3.11.4. If a path containing '\0' bytes is passed to os.path.normpath(), the path will be truncated unexpectedly at the first '\0' byte. There are plausible cases in which an application would have rejected a filename for security reasons in Python 3.10.x or earlier, but that filename is no longer rejected in Python 3.11.x.
References
- https://errata.almalinux.org/9/ALSA-2023-6494.html
- https://errata.almalinux.org/8/ALSA-2023-7024.html
- https://access.redhat.com/security/cve/CVE-2023-41105
- https://access.redhat.com/errata/RHSA-2023:6494
- https://access.redhat.com/errata/RHSA-2023:7024
- https://mail.python.org/archives/list/security-announce@python.org/thread/D6CDW3ZZC5D444YGL3VQUY6D4ECMCQLD/
- https://github.com/python/cpython/issues/106242
- https://github.com/python/cpython/pull/107981
- https://github.com/python/cpython/pull/107982
- https://github.com/python/cpython/pull/107983
- https://mail.python.org/archives/list/security-announce%40python.org/thread/D6CDW3ZZC5D444YGL3VQUY6D4ECMCQLD/
- https://security.netapp.com/advisory/ntap-20231006-0015/