Groups | Search | Server Info | Login | Register
Groups > linux.debian.announce.security > #4786
| From | Moritz Muehlenhoff <jmm@debian.org> |
|---|---|
| Newsgroups | linux.debian.announce.security |
| Subject | [SECURITY] [DSA 6220-1] simpleeval security update |
| Date | 2026-04-20 21:10 +0200 |
| Message-ID | <MM2al-gH2a-5@gated-at.bofh.it> (permalink) |
| Organization | linux.* mail to news gateway |
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 - ------------------------------------------------------------------------- Debian Security Advisory DSA-6220-1 security@debian.org https://www.debian.org/security/ Moritz Muehlenhoff April 20, 2026 https://www.debian.org/security/faq - ------------------------------------------------------------------------- Package : simpleeval CVE ID : CVE-2026-32640 Byambadalai Sumiya discovered that SimpleEval, a library for adding evaluatable expressions into Python projects, didn't fully restrict some module references, resulting in sandbox bypass. For the oldstable distribution (bookworm), this problem has been fixed in version 0.9.12-1+deb12u1. For the stable distribution (trixie), this problem has been fixed in version 1.0.3-1+deb13u1. We recommend that you upgrade your simpleeval packages. For the detailed security status of simpleeval please refer to its security tracker page at: https://security-tracker.debian.org/tracker/simpleeval Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE----- iQIzBAEBCgAdFiEEtuYvPRKsOElcDakFEMKTtsN8TjYFAmnmeDAACgkQEMKTtsN8 TjaQhA//QFnufiBLWtnT5l5ve0elOY0QZBU0lujETDtQjWcAWC/ei4qM4f4Ox/ZP 6ANm+IrvpobIHFNotUNEXe15RSN3LFVXQnDqzjPbVDKtPFZCu+MB8peEqxMTFdm/ WmiI5UE1CbtQgEDwiX5GcETZxZR0QDy5SMkjQFCfCidEYhfqYNO1RntX7CtihPcw b+jI9mifh3k7LXyTqY7JgGsekDaGu+hb06HoUYDqqNv9L2nCKwefqwM1Ogu4g7mW 10G79EARcVyYsDlWE5eTQCgB5pevkHUEZPy+HsNDGuhc3BVcpLj/+Y1nOZsCZl5s eWeUoql2llUgzC5xr4Z4kdFz4GkkvqSivAnd+jSoylVxzS9Yhi1Fegczwy/SWVGw Ibdce8IhEYHsNnuH9tflyubPA9zTKOISzq2U+b1WQPhU3TCNnS53He5Q9gDMPADP YtLKN8NoPiXLQexOXxQOtcjBeX29vPGUGS7JSibWhh56r8AdHulENNp710CVyC5x e/XFIbC2gvIhCfduLN8DB4RtTSxrSabN8oHDWz3ZwsUUgC1qc0/zz3atjJeymDp9 zdfA1NiCow4LfJeOehiXdWZNLQ0rTSNIWB4eiPAwGcENfMtO2Ln6El5Cz5JO1YCV 2s91Xwx6nHMjF92kQkb4haMMfiEePZcOTi2SuHZYFkppythiVnU= =+lxi -----END PGP SIGNATURE-----
Back to linux.debian.announce.security | Previous | Next | Find similar
[SECURITY] [DSA 6220-1] simpleeval security update Moritz Muehlenhoff <jmm@debian.org> - 2026-04-20 21:10 +0200
csiph-web