Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 907924 (CVE-2023-33733) - dev-python/reportlab: remote code execution
Summary: dev-python/reportlab: remote code execution
Status: CONFIRMED
Alias: CVE-2023-33733
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal major
Assignee: Gentoo Security
URL: https://github.com/c53elyas/CVE-2023-...
Whiteboard: B1 [upstream]
Keywords:
Depends on:
Blocks:
 
Reported: 2023-06-06 03:44 UTC by John Helmert III
Modified: 2023-06-06 03:44 UTC (History)
1 user (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description John Helmert III archtester Gentoo Infrastructure gentoo-dev Security 2023-06-06 03:44:13 UTC
CVE-2023-33733:

Reportlab up to v3.6.12 allows attackers to execute arbitrary code via supplying a crafted PDF file.

I don't see any link to an upstream report. I also note that MITRE
apparently can't even filter out blatant advertising to their CVE
references:

https://www.linkedin.com/in/elyas-damej-714b7269/
https://cure53.de/

(https://github.com/CVEProject/cvelist/blob/c37734b61aa3f1a514bef29f2ab9aa352dcdaeda/2023/33xxx/CVE-2023-33733.json#L53)