CVE-2022-35861

NameCVE-2022-35861
Descriptionpyenv 1.2.24 through 2.3.2 allows local users to gain privileges via a .python-version file in the current working directory. An attacker can craft a Python version string in .python-version to execute shims under their control. (Shims are executables that pass a command along to a specific version of pyenv. The version string is used to construct the path to the command, and there is no validation of whether the version specified is a valid version. Thus, relative path traversal can occur.)
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
pyenv (PTS)sid, trixie2.5.4-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
pyenvsource(unstable)(not affected)

Notes

- pyenv <not-affected> (Fixed before initial upload to the archive)
https://github.com/pyenv/pyenv/commit/22fa683571d98b59ea16e5fe48ac411c67939653 (2.3.30)

Search for package or bug name: Reporting problems