Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

rocky логотип

RLSA-2025:23342

Опубликовано: 19 дек. 2025
Источник: rocky
Оценка: Moderate

Описание

Moderate: python3.9 security update

Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.

Security Fix(es):

  • python: Invalid value for OpenSSL API may cause Buffer over-read when NPN is used (CVE-2024-5642)

  • cpython: Python HTMLParser quadratic complexity (CVE-2025-6069)

  • cpython: python: Python zipfile End of Central Directory (EOCD) Locator record offset not checked (CVE-2025-8291)

  • python: Quadratic complexity in os.path.expandvars() with user-controlled template (CVE-2025-6075)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Затронутые продукты

  • Rocky Linux 9

НаименованиеАрхитектураРелизRPM
python3x86_642.el9_7python3-3.9.25-2.el9_7.x86_64.rpm
python3-libsi6862.el9_7python3-libs-3.9.25-2.el9_7.i686.rpm
python3-libsx86_642.el9_7python3-libs-3.9.25-2.el9_7.x86_64.rpm

Показывать по

Связанные уязвимости

oracle-oval
29 дней назад

ELSA-2025-23342: python3.9 security update (MODERATE)

rocky
28 дней назад

Important: python39:3.9 security update

oracle-oval
24 дня назад

ELSA-2025-23530: python39:3.9 security update (IMPORTANT)

CVSS3: 6.5
ubuntu
больше 1 года назад

CPython 3.9 and earlier doesn't disallow configuring an empty list ("[]") for SSLContext.set_npn_protocols() which is an invalid value for the underlying OpenSSL API. This results in a buffer over-read when NPN is used (see CVE-2024-5535 for OpenSSL). This vulnerability is of low severity due to NPN being not widely used and specifying an empty list likely being uncommon in-practice (typically a protocol name would be configured).

CVSS3: 2.7
redhat
больше 1 года назад

CPython 3.9 and earlier doesn't disallow configuring an empty list ("[]") for SSLContext.set_npn_protocols() which is an invalid value for the underlying OpenSSL API. This results in a buffer over-read when NPN is used (see CVE-2024-5535 for OpenSSL). This vulnerability is of low severity due to NPN being not widely used and specifying an empty list likely being uncommon in-practice (typically a protocol name would be configured).