docker-library / python

Docker Official Image packaging for Python

Home Page:https://www.python.org/

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

Facing CVE-2024-3094 in Python 3.11.9-alpine3.19 Docker Image

akmatoliya opened this issue · comments

We've identified a vulnerability within our Docker image that poses a security risk.CVE-2024-3094has been detected.

About CVE-2024-3094-
Malicious code was discovered in the upstream tarballs of xz, starting with version 5.6.0. Through a series of complex obfuscations, the liblzma build process extracts a prebuilt object file from a disguised test file existing in the source code, which is then used to modify specific functions in the liblzma code. This results in a modified liblzma library that can be used by any software linked against this library, intercepting and modifying the data interaction with this library.

Could you please provide an estimated timeline for fixing this issue? Additionally, any guidance on how to address this vulnerability effectively would be highly appreciated.? We would like to ensure that our system remains secure and up-to-date.

Thank you.

The version of xz in this version is not affected by this CVE. As per https://www.cve.org/CVERecord?id=CVE-2024-3094 the version affected starts at 5.6.0 and as per https://hub.docker.com/layers/library/python/3.11.9-alpine3.19/images/sha256-3912f7fe31112ee0f747848328e1a2b225a3aad18d0800bac6e13042642fd202?context=explore the version in the image is 5.4.5