MGASA-2024-0313

Source
https://advisories.mageia.org/MGASA-2024-0313.html
Import Source
https://advisories.mageia.org/MGASA-2024-0313.json
JSON Data
https://api.osv.dev/v1/vulns/MGASA-2024-0313
Related
Published
2024-09-25T18:08:46Z
Modified
2024-09-25T17:43:39Z
Summary
Updated python-astropy packages fix security vulnerability
Details

Version 5.3.2 of the Astropy core package is vulnerable to remote code execution due to improper input validation in the TranformGraph().to_dot_graph function. A malicious user can provide a command or a script file as a value to the savelayout argument, which will be placed as the first value in a list of arguments passed to subprocess.Popen. Although an error will be raised, the command or script will be executed successfully. (CVE-2023-41334)

References
Credits

Affected packages

Mageia:9 / python-astropy

Package

Name
python-astropy
Purl
pkg:rpm/mageia/python-astropy?arch=source&distro=mageia-9

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.1.1-1.1.mga9

Ecosystem specific

{
    "section": "core"
}