Gentoo Archives: gentoo-announce

From: Aaron Bauman <bman@g.o>
To: gentoo-announce@l.g.o
Subject: [gentoo-announce] [ GLSA 201811-18 ] Tablib: Arbitrary command execution
Date: Tue, 27 Nov 2018 02:10:46
Message-Id: 20181127020323.GB19214@monkey
1 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
2 Gentoo Linux Security Advisory GLSA 201811-18
3 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
4 https://security.gentoo.org/
5 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
6
7 Severity: Normal
8 Title: Tablib: Arbitrary command execution
9 Date: November 27, 2018
10 Bugs: #621884
11 ID: 201811-18
12
13 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
14
15 Synopsis
16 ========
17
18 A vulnerability in Tablib might allow remote attackers to execute
19 arbitrary python commands.
20
21 Background
22 ==========
23
24 Tablib is an MIT Licensed format-agnostic tabular dataset library,
25 written in Python. It allows you to import, export, and manipulate
26 tabular data sets.
27
28 Affected packages
29 =================
30
31 -------------------------------------------------------------------
32 Package / Vulnerable / Unaffected
33 -------------------------------------------------------------------
34 1 dev-python/tablib < 0.12.1 >= 0.12.1
35
36 Description
37 ===========
38
39 A vulnerability was discovered in Tablib's Databook loading
40 functionality, due to improper input validation.
41
42 Impact
43 ======
44
45 A remote attacker, by enticing the user to process a specially crafted
46 Databook via YAML, could possibly execute arbitrary python commands
47 with the privilege of the process.
48
49 Workaround
50 ==========
51
52 There is no known workaround at this time.
53
54 Resolution
55 ==========
56
57 All Tablib users should upgrade to the latest version:
58
59 # emerge --sync
60 # emerge --ask --oneshot --verbose ">=dev-python/tablib-0.12.1"
61
62 References
63 ==========
64
65 [ 1 ] CVE-2017-2810
66 https://nvd.nist.gov/vuln/detail/CVE-2017-2810
67
68 Availability
69 ============
70
71 This GLSA and any updates to it are available for viewing at
72 the Gentoo Security Website:
73
74 https://security.gentoo.org/glsa/201811-18
75
76 Concerns?
77 =========
78
79 Security is a primary focus of Gentoo Linux and ensuring the
80 confidentiality and security of our users' machines is of utmost
81 importance to us. Any security concerns should be addressed to
82 security@g.o or alternatively, you may file a bug at
83 https://bugs.gentoo.org.
84
85 License
86 =======
87
88 Copyright 2018 Gentoo Foundation, Inc; referenced text
89 belongs to its owner(s).
90
91 The contents of this document are licensed under the
92 Creative Commons - Attribution / Share Alike license.
93
94 https://creativecommons.org/licenses/by-sa/2.5

Attachments

File name MIME type
signature.asc application/pgp-signature