Babel: Remote code execution — GLSA 202208-03

A vulnerability in Babel could result in remote code execution.

Affected packages

dev-python/Babel on all architectures
Affected versions < 2.9.1
Unaffected versions >= 2.9.1

Background

Babel is a collection of tools for internationalizing Python applications.

Description

Babel does not properly restrict which sources a locale can be loaded from. If Babel loads an attacker-controlled .dat file, arbitrary code execution can be achieved via unsafe Pickle deserialization.

Impact

An attacker with filesystem access and control over the locales Babel loads can achieve code execution.

Workaround

There is no known workaround at this time.

Resolution

All Babel users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=dev-python/Babel-2.9.1"
 

References

Release date
August 04, 2022

Latest revision
August 04, 2022: 1

Severity
normal

Exploitable
remote

Bugzilla entries