CVE-2018-17793

NameCVE-2018-17793
Description** DISPUTED ** Virtualenv 16.0.0 allows a sandbox escape via "python $(bash >&2)" and "python $(rbash >&2)" commands. NOTE: the software maintainer disputes this because the Python interpreter in a virtualenv is supposed to be able to execute arbitrary code.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
python-virtualenv (PTS)jessie1.11.6+ds-1vulnerable
stretch15.1.0+ds-1vulnerable
buster, sid15.1.0+ds-2vulnerable

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
python-virtualenvsource(unstable)(unfixed)unimportant

Notes

https://github.com/pypa/virtualenv/issues/1207
No real security impact. 3rd party requested CVE rejection

Search for package or bug name: Reporting problems