[Bug 1228128] New: VUL-0: CVE-2024-40647: python-sentry-sdk: environment variables exposed to subprocesses despite the `env={}` argument being set
https://bugzilla.suse.com/show_bug.cgi?id=1228128 Bug ID: 1228128 Summary: VUL-0: CVE-2024-40647: python-sentry-sdk: environment variables exposed to subprocesses despite the `env={}` argument being set Classification: openSUSE Product: openSUSE Distribution Version: Leap 15.6 Hardware: Other URL: https://smash.suse.de/issue/414560/ OS: Other Status: NEW Severity: Normal Priority: P5 - None Component: Security Assignee: python-maintainers@suse.com Reporter: smash_bz@suse.de QA Contact: security-team@suse.de CC: camila.matos@suse.com Target Milestone: --- Found By: Security Response Team Blocker: --- sentry-sdk is the official Python SDK for Sentry.io. A bug in Sentry's Python SDK < 2.8.0 allows the environment variables to be passed to subprocesses despite the `env={}` setting. In Python's `subprocess` calls, all environment variables are passed to subprocesses by default. However, if you specifically do not want them to be passed to subprocesses, you may use `env` argument in `subprocess` calls. Due to the bug in Sentry SDK, with the Stdlib integration enabled (which is enabled by default), this expectation is not fulfilled, and all environment variables are being passed to subprocesses instead. The issue has been patched in pull request #3251 and is included in sentry-sdk==2.8.0. We strongly recommend upgrading to the latest SDK version. However, if it's not possible, and if passing environment variables to child processes poses a security risk for you, you can disable all default integrations. References: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-40647 https://www.cve.org/CVERecord?id=CVE-2024-40647 https://docs.python.org/3/library/subprocess.html https://docs.sentry.io/platforms/python/integrations/default-integrations https://docs.sentry.io/platforms/python/integrations/default-integrations/#s... https://github.com/getsentry/sentry-python/commit/763e40aa4cb57ecced467f48f7... https://github.com/getsentry/sentry-python/pull/3251 https://github.com/getsentry/sentry-python/releases/tag/2.8.0 https://github.com/getsentry/sentry-python/security/advisories/GHSA-g92j-qhm... -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1228128 SMASH SMASH <smash_bz@suse.de> changed: What |Removed |Added ---------------------------------------------------------------------------- Priority|P5 - None |P3 - Medium -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1228128 Steve Kowalik <steven.kowalik@suse.com> changed: What |Removed |Added ---------------------------------------------------------------------------- Assignee|python-maintainers@suse.com |steven.kowalik@suse.com CC| |steven.kowalik@suse.com -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1228128 https://bugzilla.suse.com/show_bug.cgi?id=1228128#c4 Steve Kowalik <steven.kowalik@suse.com> changed: What |Removed |Added ---------------------------------------------------------------------------- Status|NEW |IN_PROGRESS --- Comment #4 from Steve Kowalik <steven.kowalik@suse.com> --- https://build.opensuse.org/request/show/1188538 is the SP5 submission. https://build.opensuse.org/request/show/1188539 is the SP6 submission. -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1228128 Steve Kowalik <steven.kowalik@suse.com> changed: What |Removed |Added ---------------------------------------------------------------------------- Assignee|steven.kowalik@suse.com |security-team@suse.de -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1228128 https://bugzilla.suse.com/show_bug.cgi?id=1228128#c6 --- Comment #6 from Marcus Meissner <meissner@suse.com> --- openSUSE-SU-2024:0214-1: An update that fixes one vulnerability is now available. Category: security (moderate) Bug References: 1228128 CVE References: CVE-2024-40647 JIRA References: Sources used: openSUSE Backports SLE-15-SP5 (src): python-sentry-sdk-0.14.4-bp155.3.3.1 -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1228128 https://bugzilla.suse.com/show_bug.cgi?id=1228128#c7 --- Comment #7 from Marcus Meissner <meissner@suse.com> --- openSUSE-SU-2024:0215-1: An update that fixes one vulnerability is now available. Category: security (moderate) Bug References: 1228128 CVE References: CVE-2024-40647 JIRA References: Sources used: openSUSE Backports SLE-15-SP6 (src): python-sentry-sdk-0.14.4-bp156.4.3.1 -- You are receiving this mail because: You are on the CC list for the bug.
participants (1)
-
bugzilla_noreply@suse.com