Количество 31
Количество 31
BDU:2025-06494
Уязвимость функции TarFile.extractall() и TarFile.extract() модуля tarfile интерпретатора языка программирования Python (CPython), позволяющая нарушителю записывать произвольные файлы
ROS-20250819-06
Уязвимость python3.12
ROS-20250819-05
Уязвимость python3.11
ROS-20250925-04
Множественные уязвимости python3
ROS-20250925-03
Множественные уязвимости python3.10
ROS-20250925-02
Множественные уязвимости python3.11
ROS-20250925-01
Множественные уязвимости python3.12
CVE-2025-4517
Allows arbitrary filesystem writes outside the extraction directory during extraction with filter="data". You are affected by this vulnerability if using the tarfile module to extract untrusted tar archives using TarFile.extractall() or TarFile.extract() using the filter= parameter with a value of "data" or "tar". See the tarfile extraction filters documentation https://docs.python.org/3/library/tarfile.html#tarfile-extraction-filter for more information. Note that for Python 3.14 or later the default value of filter= changed from "no filtering" to `"data", so if you are relying on this new default behavior then your usage is also affected. Note that none of these vulnerabilities significantly affect the installation of source distributions which are tar archives as source distributions already allow arbitrary code execution during the build process. However when evaluating source distributions it's important to avoid installing source distributions with suspicious links.
CVE-2025-4517
Allows arbitrary filesystem writes outside the extraction directory during extraction with filter="data". You are affected by this vulnerability if using the tarfile module to extract untrusted tar archives using TarFile.extractall() or TarFile.extract() using the filter= parameter with a value of "data" or "tar". See the tarfile extraction filters documentation https://docs.python.org/3/library/tarfile.html#tarfile-extraction-filter for more information. Note that for Python 3.14 or later the default value of filter= changed from "no filtering" to `"data", so if you are relying on this new default behavior then your usage is also affected. Note that none of these vulnerabilities significantly affect the installation of source distributions which are tar archives as source distributions already allow arbitrary code execution during the build process. However when evaluating source distributions it's important to avoid installing source distributions with suspicious links.
CVE-2025-4517
Allows arbitrary filesystem writes outside the extraction directory during extraction with filter="data". You are affected by this vulnerability if using the tarfile module to extract untrusted tar archives using TarFile.extractall() or TarFile.extract() using the filter= parameter with a value of "data" or "tar". See the tarfile extraction filters documentation https://docs.python.org/3/library/tarfile.html#tarfile-extraction-filter for more information. Note that for Python 3.14 or later the default value of filter= changed from "no filtering" to `"data", so if you are relying on this new default behavior then your usage is also affected. Note that none of these vulnerabilities significantly affect the installation of source distributions which are tar archives as source distributions already allow arbitrary code execution during the build process. However when evaluating source distributions it's important to avoid installing source distributions with suspicious links.
CVE-2025-4517
Arbitrary writes via tarfile realpath overflow
CVE-2025-4517
Allows arbitrary filesystem writes outside the extraction directory du ...
GHSA-6r6c-684h-9j7p
Allows arbitrary filesystem writes outside the extraction directory during extraction with filter="data". You are affected by this vulnerability if using the tarfile module to extract untrusted tar archives using TarFile.extractall() or TarFile.extract() using the filter= parameter with a value of "data" or "tar". See the tarfile extraction filters documentation https://docs.python.org/3/library/tarfile.html#tarfile-extraction-filter for more information. Only Python versions 3.12 or later are affected by these vulnerabilities, earlier versions don't include the extraction filter feature. Note that for Python 3.14 or later the default value of filter= changed from "no filtering" to `"data", so if you are relying on this new default behavior then your usage is also affected. Note that none of these vulnerabilities significantly affect the installation of source distributions which are tar archives as source distributions already allow arbitrary code execution during the ...
SUSE-SU-2025:02057-1
Security update for python311
SUSE-SU-2025:02050-1
Security update for python39
SUSE-SU-2025:02049-1
Security update for python311
SUSE-SU-2025:02048-1
Security update for python312
SUSE-SU-2025:02047-1
Security update for python310
RLSA-2025:10140
Important: python3.12 security update
RLSA-2025:10031
Important: python3.12 security update
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
BDU:2025-06494 Уязвимость функции TarFile.extractall() и TarFile.extract() модуля tarfile интерпретатора языка программирования Python (CPython), позволяющая нарушителю записывать произвольные файлы | CVSS3: 9.4 | 0% Низкий | 5 месяцев назад | |
ROS-20250819-06 Уязвимость python3.12 | CVSS3: 9.4 | 0% Низкий | 3 месяца назад | |
ROS-20250819-05 Уязвимость python3.11 | CVSS3: 9.4 | 0% Низкий | 3 месяца назад | |
ROS-20250925-04 Множественные уязвимости python3 | CVSS3: 9.4 | около 1 месяца назад | ||
ROS-20250925-03 Множественные уязвимости python3.10 | CVSS3: 9.4 | около 1 месяца назад | ||
ROS-20250925-02 Множественные уязвимости python3.11 | CVSS3: 9.4 | около 1 месяца назад | ||
ROS-20250925-01 Множественные уязвимости python3.12 | CVSS3: 9.4 | около 1 месяца назад | ||
CVE-2025-4517 Allows arbitrary filesystem writes outside the extraction directory during extraction with filter="data". You are affected by this vulnerability if using the tarfile module to extract untrusted tar archives using TarFile.extractall() or TarFile.extract() using the filter= parameter with a value of "data" or "tar". See the tarfile extraction filters documentation https://docs.python.org/3/library/tarfile.html#tarfile-extraction-filter for more information. Note that for Python 3.14 or later the default value of filter= changed from "no filtering" to `"data", so if you are relying on this new default behavior then your usage is also affected. Note that none of these vulnerabilities significantly affect the installation of source distributions which are tar archives as source distributions already allow arbitrary code execution during the build process. However when evaluating source distributions it's important to avoid installing source distributions with suspicious links. | CVSS3: 9.4 | 0% Низкий | 5 месяцев назад | |
CVE-2025-4517 Allows arbitrary filesystem writes outside the extraction directory during extraction with filter="data". You are affected by this vulnerability if using the tarfile module to extract untrusted tar archives using TarFile.extractall() or TarFile.extract() using the filter= parameter with a value of "data" or "tar". See the tarfile extraction filters documentation https://docs.python.org/3/library/tarfile.html#tarfile-extraction-filter for more information. Note that for Python 3.14 or later the default value of filter= changed from "no filtering" to `"data", so if you are relying on this new default behavior then your usage is also affected. Note that none of these vulnerabilities significantly affect the installation of source distributions which are tar archives as source distributions already allow arbitrary code execution during the build process. However when evaluating source distributions it's important to avoid installing source distributions with suspicious links. | CVSS3: 7.6 | 0% Низкий | 5 месяцев назад | |
CVE-2025-4517 Allows arbitrary filesystem writes outside the extraction directory during extraction with filter="data". You are affected by this vulnerability if using the tarfile module to extract untrusted tar archives using TarFile.extractall() or TarFile.extract() using the filter= parameter with a value of "data" or "tar". See the tarfile extraction filters documentation https://docs.python.org/3/library/tarfile.html#tarfile-extraction-filter for more information. Note that for Python 3.14 or later the default value of filter= changed from "no filtering" to `"data", so if you are relying on this new default behavior then your usage is also affected. Note that none of these vulnerabilities significantly affect the installation of source distributions which are tar archives as source distributions already allow arbitrary code execution during the build process. However when evaluating source distributions it's important to avoid installing source distributions with suspicious links. | CVSS3: 9.4 | 0% Низкий | 5 месяцев назад | |
CVE-2025-4517 Arbitrary writes via tarfile realpath overflow | CVSS3: 9.4 | 0% Низкий | 4 месяца назад | |
CVE-2025-4517 Allows arbitrary filesystem writes outside the extraction directory du ... | CVSS3: 9.4 | 0% Низкий | 5 месяцев назад | |
GHSA-6r6c-684h-9j7p Allows arbitrary filesystem writes outside the extraction directory during extraction with filter="data". You are affected by this vulnerability if using the tarfile module to extract untrusted tar archives using TarFile.extractall() or TarFile.extract() using the filter= parameter with a value of "data" or "tar". See the tarfile extraction filters documentation https://docs.python.org/3/library/tarfile.html#tarfile-extraction-filter for more information. Only Python versions 3.12 or later are affected by these vulnerabilities, earlier versions don't include the extraction filter feature. Note that for Python 3.14 or later the default value of filter= changed from "no filtering" to `"data", so if you are relying on this new default behavior then your usage is also affected. Note that none of these vulnerabilities significantly affect the installation of source distributions which are tar archives as source distributions already allow arbitrary code execution during the ... | CVSS3: 9.4 | 0% Низкий | 5 месяцев назад | |
SUSE-SU-2025:02057-1 Security update for python311 | 5 месяцев назад | |||
SUSE-SU-2025:02050-1 Security update for python39 | 5 месяцев назад | |||
SUSE-SU-2025:02049-1 Security update for python311 | 5 месяцев назад | |||
SUSE-SU-2025:02048-1 Security update for python312 | 5 месяцев назад | |||
SUSE-SU-2025:02047-1 Security update for python310 | 5 месяцев назад | |||
RLSA-2025:10140 Important: python3.12 security update | около 1 месяца назад | |||
RLSA-2025:10031 Important: python3.12 security update | 3 месяца назад |
Уязвимостей на страницу