Описание
There is a HIGH severity vulnerability affecting the CPython "zipfile" module affecting "zipfile.Path". Note that the more common API "zipfile.ZipFile" class is unaffected. When iterating over names of entries in a zip archive (for example, methods of "zipfile.Path" like "namelist()", "iterdir()", etc) the process can be put into an infinite loop with a maliciously crafted zip archive. This defect applies when reading only metadata or extracting the contents of the zip archive. Programs that are not handling user-controlled zip archives are not affected.
Релиз | Статус | Примечание |
---|---|---|
devel | DNE | |
esm-apps/focal | not-affected | code not present |
esm-apps/jammy | not-affected | code not present |
esm-infra-legacy/trusty | not-affected | code not present |
esm-infra/bionic | not-affected | code not present |
esm-infra/xenial | not-affected | code not present |
focal | not-affected | code not present |
jammy | not-affected | code not present |
noble | DNE | |
oracular | DNE |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
devel | DNE | |
esm-infra/focal | DNE | |
focal | DNE | |
jammy | released | 3.10.12-1~22.04.6 |
noble | DNE | |
oracular | DNE | |
plucky | DNE | |
upstream | needs-triage |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
devel | DNE | |
esm-apps/jammy | needs-triage | |
esm-infra/focal | DNE | |
focal | DNE | |
jammy | needs-triage | |
noble | DNE | |
oracular | DNE | |
plucky | DNE | |
upstream | needs-triage |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
devel | DNE | |
esm-infra/focal | DNE | |
focal | DNE | |
jammy | DNE | |
noble | released | 3.12.3-1ubuntu0.2 |
oracular | not-affected | 3.12.6-1 |
plucky | DNE | |
upstream | released | 3.12.6-1 |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
devel | not-affected | 3.13.0~rc2-1 |
esm-infra/focal | DNE | |
focal | DNE | |
jammy | DNE | |
noble | DNE | |
oracular | not-affected | 3.13.0~rc2-1 |
plucky | not-affected | 3.13.0~rc2-1 |
upstream | released | 3.13.0~rc2-1 |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
devel | DNE | |
esm-infra-legacy/trusty | not-affected | code not present |
esm-infra/focal | DNE | |
focal | DNE | |
jammy | DNE | |
noble | DNE | |
oracular | DNE | |
plucky | DNE | |
trusty/esm | ignored | end of ESM support, was needs-triage |
upstream | not-affected | code not present |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
devel | DNE | |
esm-infra-legacy/trusty | not-affected | code not present |
esm-infra/focal | DNE | |
esm-infra/xenial | not-affected | code not present |
focal | DNE | |
jammy | DNE | |
noble | DNE | |
oracular | DNE | |
plucky | DNE | |
trusty/esm | ignored | end of ESM support, was needs-triage |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
devel | DNE | |
esm-infra/bionic | not-affected | code not present |
esm-infra/focal | DNE | |
focal | DNE | |
jammy | DNE | |
noble | DNE | |
oracular | DNE | |
plucky | DNE | |
upstream | not-affected | code not present |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
devel | DNE | |
esm-apps/bionic | not-affected | code not present |
esm-infra/focal | DNE | |
focal | DNE | |
jammy | DNE | |
noble | DNE | |
oracular | DNE | |
plucky | DNE | |
upstream | not-affected | code not present |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
devel | DNE | |
esm-apps/bionic | needs-triage | |
esm-infra/focal | not-affected | 3.8.10-0ubuntu1~20.04.12 |
focal | released | 3.8.10-0ubuntu1~20.04.12 |
jammy | DNE | |
noble | DNE | |
oracular | DNE | |
plucky | DNE | |
upstream | needs-triage |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
devel | DNE | |
esm-apps/focal | needs-triage | |
focal | ignored | end of standard support, was needs-triage |
jammy | DNE | |
noble | DNE | |
oracular | DNE | |
plucky | DNE | |
upstream | needs-triage |
Показывать по
EPSS
Связанные уязвимости
There is a HIGH severity vulnerability affecting the CPython "zipfile" module affecting "zipfile.Path". Note that the more common API "zipfile.ZipFile" class is unaffected. When iterating over names of entries in a zip archive (for example, methods of "zipfile.Path" like "namelist()", "iterdir()", etc) the process can be put into an infinite loop with a maliciously crafted zip archive. This defect applies when reading only metadata or extracting the contents of the zip archive. Programs that are not handling user-controlled zip archives are not affected.
There is a HIGH severity vulnerability affecting the CPython "zipfile" module affecting "zipfile.Path". Note that the more common API "zipfile.ZipFile" class is unaffected. When iterating over names of entries in a zip archive (for example, methods of "zipfile.Path" like "namelist()", "iterdir()", etc) the process can be put into an infinite loop with a maliciously crafted zip archive. This defect applies when reading only metadata or extracting the contents of the zip archive. Programs that are not handling user-controlled zip archives are not affected.
There is a HIGH severity vulnerability affecting the CPython "zipfile" ...
EPSS