VYPR

rpm package

suse/python3&distro=SUSE Linux Enterprise Micro 5.1

pkg:rpm/suse/python3&distro=SUSE%20Linux%20Enterprise%20Micro%205.1

Vulnerabilities (34)

  • CVE-2025-8194HigJul 28, 2025
    affected < 3.6.15-150000.3.185.2fixed 3.6.15-150000.3.185.2

    There is a defect in the CPython “tarfile” module affecting the “TarFile” extraction and entry enumeration APIs. The tar implementation would process tar archives with negative offsets without error, resulting in an infinite loop and deadlock during the parsing of maliciously cra

  • CVE-2025-6069MedJun 17, 2025
    affected < 3.6.15-150000.3.182.1fixed 3.6.15-150000.3.182.1

    The html.parser.HTMLParser class had worse-case quadratic complexity when processing certain crafted malformed inputs potentially leading to amplified denial-of-service.

  • CVE-2025-4517CriJun 3, 2025
    affected < 3.6.15-150000.3.182.1fixed 3.6.15-150000.3.182.1

    Allows arbitrary filesystem writes outside the extraction directory during extraction with filter="data". You are affected by this vulnerability if using the tarfile module to extract untrusted tar archives using TarFile.extractall() or TarFile.extract() using the filter= param

  • CVE-2025-4435HigJun 3, 2025
    affected < 3.6.15-150000.3.182.1fixed 3.6.15-150000.3.182.1

    When using a TarFile.errorlevel = 0 and extracting with a filter the documented behavior is that any filtered members would be skipped and not extracted. However the actual behavior of TarFile.errorlevel = 0 in affected versions is that the member would still be extracted and not

  • CVE-2025-4330HigJun 3, 2025
    affected < 3.6.15-150000.3.182.1fixed 3.6.15-150000.3.182.1

    Allows the extraction filter to be ignored, allowing symlink targets to point outside the destination directory, and the modification of some file metadata. You are affected by this vulnerability if using the tarfile module to extract untrusted tar archives using TarFile.extrac

  • CVE-2025-4138HigJun 3, 2025
    affected < 3.6.15-150000.3.182.1fixed 3.6.15-150000.3.182.1

    Allows the extraction filter to be ignored, allowing symlink targets to point outside the destination directory, and the modification of some file metadata. You are affected by this vulnerability if using the tarfile module to extract untrusted tar archives using TarFile.extrac

  • CVE-2024-12718MedJun 3, 2025
    affected < 3.6.15-150000.3.182.1fixed 3.6.15-150000.3.182.1

    Allows modifying some file metadata (e.g. last modified) with filter="data" or file permissions (chmod) with filter="tar" of files outside the extraction directory. You are affected by this vulnerability if using the tarfile module to extract untrusted tar archives using TarFile.

  • CVE-2025-4516MedMay 15, 2025
    affected < 3.6.15-150000.3.176.1fixed 3.6.15-150000.3.176.1

    There is an issue in CPython when using `bytes.decode("unicode_escape", error="ignore|replace")`. If you are not using the "unicode_escape" encoding or an error handler your usage is not affected. To work-around this issue you may stop using the error= handler and instead wrap th

  • CVE-2025-0938MedJan 31, 2025
    affected < 3.6.15-150000.3.170.1fixed 3.6.15-150000.3.170.1

    The Python standard library functions `urllib.parse.urlsplit` and `urlparse` accepted domain names that included square brackets which isn't valid according to RFC 3986. Square brackets are only meant to be used as delimiters for specifying IPv6 and IPvFuture hosts in URLs. This

  • CVE-2024-11168LowNov 12, 2024
    affected < 3.6.15-150000.3.167.1fixed 3.6.15-150000.3.167.1

    The urllib.parse.urlsplit() and urlparse() functions improperly validated bracketed hosts (`[]`), allowing hosts that weren't IPv6 or IPvFuture. This behavior was not conformant to RFC 3986 and potentially enabled SSRF if a URL is processed by more than one URL parser.

  • CVE-2024-9287Oct 22, 2024
    affected < 3.6.15-150000.3.164.1fixed 3.6.15-150000.3.164.1

    A vulnerability has been found in the CPython `venv` module and CLI where path names provided when creating a virtual environment were not quoted properly, allowing the creator to inject commands into virtual environment "activation" scripts (ie "source venv/bin/activate"). This

  • CVE-2024-6232Sep 3, 2024
    affected < 3.6.15-150000.3.161.1fixed 3.6.15-150000.3.161.1

    There is a MEDIUM severity vulnerability affecting CPython. Regular expressions that allowed excessive backtracking during tarfile.TarFile header parsing are vulnerable to ReDoS via specifically-crafted tar archives.

  • CVE-2024-7592Aug 19, 2024
    affected < 3.6.15-150000.3.155.2fixed 3.6.15-150000.3.155.2

    There is a LOW severity vulnerability affecting CPython, specifically the 'http.cookies' standard library module. When parsing cookies that contained backslashes for quoted characters in the cookie value, the parser would use an algorithm with quadratic complexity, resulting in

  • CVE-2024-6923MedAug 1, 2024
    affected < 3.6.15-150000.3.155.2fixed 3.6.15-150000.3.155.2

    There is a MEDIUM severity vulnerability affecting CPython. The email module didn’t properly quote newlines for email headers when serializing an email message allowing for header injection when an email is serialized.

  • CVE-2024-5642MedJun 27, 2024
    affected < 3.6.15-150000.3.158.1fixed 3.6.15-150000.3.158.1

    CPython 3.9 and earlier doesn't disallow configuring an empty list ("[]") for SSLContext.set_npn_protocols() which is an invalid value for the underlying OpenSSL API. This results in a buffer over-read when NPN is used (see CVE-2024-5535 for OpenSSL). This vulnerability is of low

  • CVE-2024-0397HigJun 17, 2024
    affected < 3.6.15-150000.3.150.1fixed 3.6.15-150000.3.150.1

    A defect was discovered in the Python “ssl” module where there is a memory race condition with the ssl.SSLContext methods “cert_store_stats()” and “get_ca_certs()”. The race condition can be triggered if the methods are called at the same time as certificates are loaded into the

  • CVE-2024-4032HigJun 17, 2024
    affected < 3.6.15-150000.3.150.1fixed 3.6.15-150000.3.150.1

    The “ipaddress” module contained incorrect information about whether certain IPv4 and IPv6 addresses were designated as “globally reachable” or “private”. This affected the is_private and is_global properties of the ipaddress.IPv4Address, ipaddress.IPv4Network, ipaddress.IPv6Addr

  • CVE-2024-0450MedMar 19, 2024
    affected < 3.6.15-150000.3.147.1fixed 3.6.15-150000.3.147.1

    An issue was found in the CPython `zipfile` module affecting versions 3.12.1, 3.11.7, 3.10.13, 3.9.18, and 3.8.18 and prior. The zipfile module is vulnerable to “quoted-overlap” zip-bombs which exploit the zip format to create a zip-bomb with a high compression ratio. The fixed

  • CVE-2023-6597HigMar 19, 2024
    affected < 3.6.15-150000.3.141.1fixed 3.6.15-150000.3.141.1

    An issue was found in the CPython `tempfile.TemporaryDirectory` class affecting versions 3.12.1, 3.11.7, 3.10.13, 3.9.18, and 3.8.18 and prior. The tempfile.TemporaryDirectory class would dereference symlinks during cleanup of permissions-related errors. This means users which c

  • CVE-2023-52425Feb 4, 2024
    affected < 3.6.15-150000.3.147.1fixed 3.6.15-150000.3.147.1

    libexpat through 2.5.0 allows a denial of service (resource consumption) because many full reparsings are required in the case of a large token for which multiple buffer fills are needed.

Page 1 of 2