CVE-2024-47532

NameCVE-2024-47532
DescriptionRestrictedPython is a restricted execution environment for Python to run untrusted code. A user can gain access to protected (and potentially sensible) information indirectly via AttributeError.obj and the string module. The problem will be fixed in version 7.3. As a workaround, If the application does not require access to the module string, it can remove it from RestrictedPython.Utilities.utility_builtins or otherwise do not make it available in the restricted execution environment.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
Debian Bugs1084057

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
restrictedpython (PTS)buster, bullseye4.0~b3-2vulnerable
bookworm4.0~b3-3vulnerable
sid, trixie6.2-1vulnerable

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
restrictedpythonsourcebuster(unfixed)end-of-life
restrictedpythonsource(unstable)(unfixed)1084057

Notes

[bookworm] - restrictedpython <no-dsa> (Minor issue)
[bullseye] - restrictedpython <postponed> (Minor issue; can be fixed in next update)
https://github.com/zopefoundation/RestrictedPython/security/advisories/GHSA-5rfv-66g4-jr8h
Fixed by: https://github.com/zopefoundation/RestrictedPython/commit/d701cc36cccac36b21fa200f1f2d1945a9a215e6 (7.3)

Search for package or bug name: Reporting problems