From a87d0d6b8bfa400637c56d3194b22fca5cbd6f9e Mon Sep 17 00:00:00 2001 From: V3n3RiX Date: Thu, 4 Aug 2022 20:05:57 +0100 Subject: gentoo auto-resync : 04:08:2022 - 20:05:57 --- metadata/glsa/glsa-202208-03.xml | 42 ++++++++++++++++++++++++++++++++++++++++ 1 file changed, 42 insertions(+) create mode 100644 metadata/glsa/glsa-202208-03.xml (limited to 'metadata/glsa/glsa-202208-03.xml') diff --git a/metadata/glsa/glsa-202208-03.xml b/metadata/glsa/glsa-202208-03.xml new file mode 100644 index 000000000000..942101cddcc7 --- /dev/null +++ b/metadata/glsa/glsa-202208-03.xml @@ -0,0 +1,42 @@ + + + + Babel: Remote code execution + A vulnerability in Babel could result in remote code execution. + Babel + 2022-08-04 + 2022-08-04 + 786954 + remote + + + 2.9.1 + 2.9.1 + + + +

Babel is a collection of tools for internationalizing Python applications.

+
+ +

Babel does not properly restrict which sources a locale can be loaded from. If Babel loads an attacker-controlled .dat file, arbitrary code execution can be achieved via unsafe Pickle deserialization.

+
+ +

An attacker with filesystem access and control over the locales Babel loads can achieve code execution.

+
+ +

There is no known workaround at this time.

+
+ +

All Babel users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-python/Babel-2.9.1" + +
+ + CVE-2021-20095 + + ajak + ajak +
\ No newline at end of file -- cgit v1.2.3