跳转到帖子

Amazon Linux 2023: CVE-2023-41105: Important priority package update for python3.11

recommended_posts

发布于
  • Members

Amazon Linux 2023: CVE-2023-41105: Important priority package update for python3.11

Severity
8
CVSS
(AV:N/AC:L/Au:N/C:N/I:C/A:N)
Published
08/23/2023
Created
02/14/2025
Added
02/14/2025
Modified
02/14/2025

Description

An issue was discovered in Python 3.11 through 3.11.4. If a path containing '\0' bytes is passed to os.path.normpath(), the path will be truncated unexpectedly at the first '\0' byte. There are plausible cases in which an application would have rejected a filename for security reasons in Python 3.10.x or earlier, but that filename is no longer rejected in Python 3.11.x. Python 3.11 os.path.normpath() function is vulnerable to path truncation if a null byte is inserted in the middle of passed path. This may result in bypass of allow lists if implemented before the verification of the path.

Solution(s)

  • amazon-linux-2023-upgrade-python3-11
  • amazon-linux-2023-upgrade-python3-11-debug
  • amazon-linux-2023-upgrade-python3-11-debuginfo
  • amazon-linux-2023-upgrade-python3-11-debugsource
  • amazon-linux-2023-upgrade-python3-11-devel
  • amazon-linux-2023-upgrade-python3-11-idle
  • amazon-linux-2023-upgrade-python3-11-libs
  • amazon-linux-2023-upgrade-python3-11-test
  • amazon-linux-2023-upgrade-python3-11-tkinter

References

  • https://attackerkb.com/topics/cve-2023-41105
  • CVE - 2023-41105
  • https://alas.aws.amazon.com/AL2023/ALAS-2023-317.html
  • 查看数 702
  • 已创建
  • 最后回复

参与讨论

你可立刻发布并稍后注册。 如果你有帐户,立刻登录发布帖子。
注意:你的帖子需要版主批准后才能看到。

游客
回帖…