VYPR

Bitnami package

libpython

pkg:bitnami/libpython

Vulnerabilities (80)

  • CVE-2026-8328MedMay 13, 2026
    affected < 3.14.5fixed 3.14.5

    The ftpcp() function in Lib/ftplib.py was not updated when CVE-2021-4189 was fixed. While makepasv() was patched to replace server-supplied PASV host addresses with the actual peer address (getpeername()[0]), ftpcp() still calls parse227() directly and passes the raw attacker

  • CVE-2026-7210CriMay 11, 2026
    affected >= 0

    `xml.parsers.expat` and `xml.etree.ElementTree` use insufficient entropy for Expat hash-flooding protection, which allows a crafted XML document to trigger hash flooding.\r\n\r\nFully mitigating this vulnerability requires both updating libexpat to 2.8.0 or later and applying thi

  • CVE-2026-3087HigApr 27, 2026
    affected < 3.14.5fixed 3.14.5

    If `shutil.unpack_archive()` is given a ZIP archive with an absolute Windows path containing a drive (`C:\\...`) then the archive will be extracted outside the target directory which is different than other operating systems. Only Windows is affected by this vulnerability.

  • CVE-2026-6019MedApr 22, 2026
    affected < 3.14.5fixed 3.14.5

    http.cookies.Morsel.js_output() returns an inline inside the generated script element. Mitigation base64-encodes the cookie value to disallow esc

  • CVE-2026-3298HigApr 21, 2026
    affected >= 3.11.0

    The method "sock_recvfrom_into()" of "asyncio.ProacterEventLoop" (Windows only) was missing a boundary check for the data buffer when using nbytes parameter. This allowed for an out-of-bounds buffer write if data was larger than the buffer size. Non-Windows platforms are not affe

  • CVE-2026-5713MedApr 14, 2026
    affected >= 3.15.0

    The "profiling.sampling" module (Python 3.15+) and "asyncio introspection capabilities" (3.14+, "python -m asyncio ps" and "python -m asyncio pstree") features could be used to read and write addresses in a privileged process if that process connected to a malicious or "infected"

  • CVE-2026-4786HigApr 13, 2026
    affected < 3.14.5fixed 3.14.5

    Mitgation of CVE-2026-4519 was incomplete. If the URL contained "%action" the mitigation could be bypassed for certain browser types the "webbrowser.open()" API could have commands injected into the underlying shell. See CVE-2026-4519 for details.

  • CVE-2026-6100CriApr 13, 2026
    affected < 3.14.5fixed 3.14.5

    Use-after-free (UAF) was possible in the `lzma.LZMADecompressor`, `bz2.BZ2Decompressor`, and `gzip.GzipFile` when a memory allocation fails with a `MemoryError` and the decompression instance is re-used. This scenario can be triggered if the process is under memory pressure. The

  • CVE-2026-3446MedApr 10, 2026
    affected < 3.13.13fixed 3.13.13

    When calling base64.b64decode() or related functions the decoding process would stop after encountering the first padded quad regardless of whether there was more information to be processed. This can lead to data being accepted which may be processed differently by other impleme

  • CVE-2026-1502MedApr 10, 2026
    affected < 3.14.5fixed 3.14.5

    CR/LF bytes were not rejected by HTTP client proxy tunnel headers or host.

  • CVE-2026-4224MedMar 16, 2026
    affected < 3.13.13fixed 3.13.13

    When an Expat parser with a registered ElementDeclHandler parses an inline document type definition containing a deeply nested content model a C stack overflow occurs.

  • CVE-2026-1299MedJan 23, 2026
    affected < 3.10.20fixed 3.10.20

    The email module, specifically the "BytesGenerator" class, didn’t properly quote newlines for email headers when serializing an email message allowing for header injection when an email is serialized. This is only applicable if using "LiteralHeader" writing headers that don't

  • CVE-2025-12781Jan 21, 2026
    affected < 3.15.0fixed 3.15.0

    When passing data to the b64decode(), standard_b64decode(), and urlsafe_b64decode() functions in the "base64" module the characters "+/" will always be accepted, regardless of the value of "altchars" parameter, typically used to establish an "alternative base64 alphabet" such as

  • CVE-2026-0865MedJan 20, 2026
    affected < 3.10.20fixed 3.10.20

    User-controlled header names and values containing newlines can allow injecting HTTP headers.

  • CVE-2026-0672MedJan 20, 2026
    affected < 3.10.20fixed 3.10.20

    When using http.cookies.Morsel, user-controlled cookie values and parameters can allow injecting HTTP headers into messages. Patch rejects all control characters within cookie names, values, and parameters.

  • CVE-2025-15367MedJan 20, 2026
    affected < 3.15.0fixed 3.15.0

    The poplib module, when passed a user-controlled command, can have additional commands injected using newlines. Mitigation rejects commands containing control characters.

  • CVE-2025-15366MedJan 20, 2026
    affected < 3.15.0fixed 3.15.0

    The imaplib module, when passed a user-controlled command, can have additional commands injected using newlines. Mitigation rejects commands containing control characters.

  • CVE-2025-15282MedJan 20, 2026
    affected < 3.10.20fixed 3.10.20

    User-controlled data URLs parsed by urllib.request.DataHandler allow injecting headers through newlines in the data URL mediatype.

  • CVE-2025-11468MedJan 20, 2026
    affected < 3.10.20fixed 3.10.20

    When folding a long comment in an email header containing exclusively unfoldable characters, the parenthesis would not be preserved. This could be used for injecting headers into email messages where addresses are user-controlled and not sanitized.

  • CVE-2025-12084Dec 3, 2025
    affected < 3.10.20fixed 3.10.20

    When building nested elements using xml.dom.minidom methods such as appendChild() that have a dependency on _clear_id_cache() the algorithm is quadratic. Availability can be impacted when building excessively nested documents.

Page 1 of 4