{"id":"USN-7355-1","summary":"restrictedpython vulnerabilities","details":"Nakul Choudhary and Robert Xiao discovered that RestrictedPython did not\nproperly sanitize certain inputs. An attacker could possibly use this\nissue to execute arbitrary code. This issue only affected\nUbuntu 20.04 LTS and Ubuntu 22.04 LTS. (CVE-2023-37271)\n\nAbhishek Govindarasu, Ankush Menat and Ward Theunisse discovered that\nRestrictedPython did not correctly handle certain format strings. An\nattacker could possibly use this issue to leak sensitive information.\nThis issue only affected Ubuntu 20.04 LTS and Ubuntu 22.04 LTS.\n(CVE-2023-41039)\n\nIt was discovered that RestrictedPython did not correctly restrict access\nto certain fields. An attacker could possibly use this issue to leak\nsensitive information. (CVE-2024-47532)\n\nIt was discovered that RestrictedPython contained a type confusion\nvulnerability. An attacker could possibly use this issue to execute\narbitrary code. This issue only affected Ubuntu 24.04 LTS and\nUbuntu 24.10. (CVE-2025-22153)\n","modified":"2026-02-10T04:47:18Z","published":"2025-03-18T23:59:57Z","related":["UBUNTU-CVE-2023-37271","UBUNTU-CVE-2023-41039","UBUNTU-CVE-2024-47532","UBUNTU-CVE-2025-22153"],"upstream":["CVE-2023-37271","CVE-2023-41039","CVE-2024-47532","CVE-2025-22153","UBUNTU-CVE-2023-37271","UBUNTU-CVE-2023-41039","UBUNTU-CVE-2024-47532","UBUNTU-CVE-2025-22153"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-7355-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-37271"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-41039"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-47532"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2025-22153"}],"affected":[{"package":{"name":"restrictedpython","ecosystem":"Ubuntu:Pro:20.04:LTS","purl":"pkg:deb/ubuntu/restrictedpython@4.0~b3-2ubuntu0.1~esm1?arch=source&distro=esm-apps/focal"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.0~b3-2ubuntu0.1~esm1"}]}],"versions":["4.0~b3-2"],"ecosystem_specific":{"availability":"Available with Ubuntu Pro: https://ubuntu.com/pro","binaries":[{"binary_version":"4.0~b3-2ubuntu0.1~esm1","binary_name":"python3-restrictedpython"}]},"database_specific":{"cves_map":{"cves":[{"id":"CVE-2023-37271","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:L"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2023-41039","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:L"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2024-47532","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"type":"CVSS_V4","score":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N"},{"type":"Ubuntu","score":"medium"}]}],"ecosystem":"Ubuntu:Pro:20.04:LTS"},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-7355-1.json"}},{"package":{"name":"restrictedpython","ecosystem":"Ubuntu:Pro:22.04:LTS","purl":"pkg:deb/ubuntu/restrictedpython@4.0~b3-3ubuntu0.1~esm1?arch=source&distro=esm-apps/jammy"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.0~b3-3ubuntu0.1~esm1"}]}],"versions":["4.0~b3-2","4.0~b3-2ubuntu1","4.0~b3-3"],"ecosystem_specific":{"availability":"Available with Ubuntu Pro: https://ubuntu.com/pro","binaries":[{"binary_version":"4.0~b3-3ubuntu0.1~esm1","binary_name":"python3-restrictedpython"}]},"database_specific":{"cves_map":{"cves":[{"id":"CVE-2023-37271","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:L"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2023-41039","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:L"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2024-47532","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"type":"CVSS_V4","score":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N"},{"type":"Ubuntu","score":"medium"}]}],"ecosystem":"Ubuntu:Pro:22.04:LTS"},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-7355-1.json"}},{"package":{"name":"restrictedpython","ecosystem":"Ubuntu:Pro:24.04:LTS","purl":"pkg:deb/ubuntu/restrictedpython@6.2-1ubuntu0.24.04.1~esm1?arch=source&distro=esm-apps/noble"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"6.2-1ubuntu0.24.04.1~esm1"}]}],"versions":["4.0~b3-3","6.2-1"],"ecosystem_specific":{"availability":"Available with Ubuntu Pro: https://ubuntu.com/pro","binaries":[{"binary_version":"6.2-1ubuntu0.24.04.1~esm1","binary_name":"python3-restrictedpython"}]},"database_specific":{"cves_map":{"cves":[{"id":"CVE-2024-47532","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"type":"CVSS_V4","score":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2025-22153","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:L"},{"type":"Ubuntu","score":"medium"}]}],"ecosystem":"Ubuntu:Pro:24.04:LTS"},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-7355-1.json"}}],"schema_version":"1.7.3"}