First published: Tue Nov 19 2024(Updated: )
It was discovered that Python incorrectly handled quoting path names when using the venv module. A local attacker able to control virtual environments could possibly use this issue to execute arbitrary code when the virtual environment is activated.
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/python3.12 | <3.12.7-1ubuntu1 | 3.12.7-1ubuntu1 |
Xfce Application Finder | =24.10 | |
All of | ||
ubuntu/python3.12-minimal | <3.12.7-1ubuntu1 | 3.12.7-1ubuntu1 |
Xfce Application Finder | =24.10 | |
All of | ||
ubuntu/python3.12 | <3.12.3-1ubuntu0.3 | 3.12.3-1ubuntu0.3 |
Xfce Application Finder | =24.04 | |
All of | ||
ubuntu/python3.12-minimal | <3.12.3-1ubuntu0.3 | 3.12.3-1ubuntu0.3 |
Xfce Application Finder | =24.04 | |
All of | ||
ubuntu/python3.10 | <3.10.12-1~22.04.7 | 3.10.12-1~22.04.7 |
Xfce Application Finder | =22.04 | |
All of | ||
ubuntu/python3.10-minimal | <3.10.12-1~22.04.7 | 3.10.12-1~22.04.7 |
Xfce Application Finder | =22.04 | |
All of | ||
ubuntu/python3.8 | <3.8.10-0ubuntu1~20.04.13 | 3.8.10-0ubuntu1~20.04.13 |
Xfce Application Finder | =20.04 | |
All of | ||
ubuntu/python3.8-minimal | <3.8.10-0ubuntu1~20.04.13 | 3.8.10-0ubuntu1~20.04.13 |
Xfce Application Finder | =20.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
USN-7116-1 is classified as a high severity vulnerability due to the potential for arbitrary code execution.
To fix USN-7116-1, update your Python packages to the latest versions specified in the advisory.
USN-7116-1 affects multiple versions of Python 3.12, 3.10, and 3.8 across various Ubuntu releases.
The vulnerability can be exploited by local attackers who control virtual environments to execute arbitrary code.
Yes, the USN-7116-1 vulnerability is specific to Ubuntu 20.04, 22.04, and 24.10 with vulnerable Python packages.