Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

rocky логотип

RLSA-2024:9192

Опубликовано: 17 мар. 2025
Источник: rocky
Оценка: Moderate

Описание

Moderate: python3.11 security update

Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.

Security Fix(es):

  • python: The zipfile module is vulnerable to zip-bombs leading to denial of service (CVE-2024-0450)

  • python: cpython: Iterating over a malicious ZIP file may lead to Denial of Service (CVE-2024-8088)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.

Затронутые продукты

  • Rocky Linux 9

НаименованиеАрхитектураРелизRPM
python3.11x86_647.el9_5.2python3.11-3.11.9-7.el9_5.2.x86_64.rpm
python3.11-develi6867.el9_5.2python3.11-devel-3.11.9-7.el9_5.2.i686.rpm
python3.11-develx86_647.el9_5.2python3.11-devel-3.11.9-7.el9_5.2.x86_64.rpm
python3.11-libsi6867.el9_5.2python3.11-libs-3.11.9-7.el9_5.2.i686.rpm
python3.11-libsx86_647.el9_5.2python3.11-libs-3.11.9-7.el9_5.2.x86_64.rpm
python3.11-tkinterx86_647.el9_5.2python3.11-tkinter-3.11.9-7.el9_5.2.x86_64.rpm

Показывать по

Связанные CVE

Связанные уязвимости

oracle-oval
12 месяцев назад

ELSA-2024-9192: python3.11 security update (MODERATE)

rocky
8 месяцев назад

Moderate: python3.12 security update

oracle-oval
12 месяцев назад

ELSA-2024-9190: python3.12 security update (MODERATE)

ubuntu
около 1 года назад

There is a HIGH severity vulnerability affecting the CPython "zipfile" module affecting "zipfile.Path". Note that the more common API "zipfile.ZipFile" class is unaffected. When iterating over names of entries in a zip archive (for example, methods of "zipfile.Path" like "namelist()", "iterdir()", etc) the process can be put into an infinite loop with a maliciously crafted zip archive. This defect applies when reading only metadata or extracting the contents of the zip archive. Programs that are not handling user-controlled zip archives are not affected.

CVSS3: 5.3
redhat
около 1 года назад

There is a HIGH severity vulnerability affecting the CPython "zipfile" module affecting "zipfile.Path". Note that the more common API "zipfile.ZipFile" class is unaffected. When iterating over names of entries in a zip archive (for example, methods of "zipfile.Path" like "namelist()", "iterdir()", etc) the process can be put into an infinite loop with a maliciously crafted zip archive. This defect applies when reading only metadata or extracting the contents of the zip archive. Programs that are not handling user-controlled zip archives are not affected.