&2)" and "python $(rbash >&2)" commands. NOTE: the software maintainer disputes this because the Python interpreter in a virtualenv is supposed to be able to execute arbitrary code. "> OVAL Reference oval:com.ubuntu.bionic:def:201817793000 - CERT Civis.Net
Oval Definition:oval:com.ubuntu.bionic:def:201817793000
Revision Date:2018-09-30Version:1
Title:CVE-2018-17793 on Ubuntu 18.04 LTS (bionic) - medium.
Description:** DISPUTED ** Virtualenv 16.0.0 allows a sandbox escape via "python $(bash >&2)" and "python $(rbash >&2)" commands. NOTE: the software maintainer disputes this because the Python interpreter in a virtualenv is supposed to be able to execute arbitrary code.
Family:unixClass:vulnerability
Status:Reference(s):CVE-2018-17793
Platform(s):Ubuntu 18.04 LTS
Product(s):
Definition Synopsis
  • Ubuntu 18.04 LTS (bionic) is installed.
  • AND The 'python-virtualenv' package in bionic is affected, but a decision has been made to defer addressing it (note: '2019-02-15').
  • BACK