python3.11-3.11.13-1.el8_10

エラータID: AXSA:2025-10428:04

Release date: 
Monday, July 7, 2025 - 12:14
Subject: 
python3.11-3.11.13-1.el8_10
Affected Channels: 
Asianux Server 8 for x86_64
Severity: 
High
Description: 

Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.

Security Fix(es):

* cpython: Tarfile extracts filtered members when errorlevel=0 (CVE-2025-4435)
* cpython: Bypass extraction filter to modify file metadata outside extraction directory (CVE-2024-12718)
* cpython: Extraction filter bypass for linking outside extraction directory (CVE-2025-4330)
* python: cpython: Arbitrary writes via tarfile realpath overflow (CVE-2025-4517)
* cpython: python: Bypassing extraction filter to create symlinks to arbitrary targets outside extraction directory (CVE-2025-4138)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

CVE-2024-12718
Allows modifying some file metadata (e.g. last modified) with filter="data" or file permissions (chmod) with filter="tar" of files outside the extraction directory. You are affected by this vulnerability if using the tarfile module to extract untrusted tar archives using TarFile.extractall() or TarFile.extract() using the filter= parameter with a value of "data" or "tar". See the tarfile extraction filters documentation https://docs.python.org/3/library/tarfile.html#tarfile-extraction-filter  for more information. Only Python versions 3.12 or later are affected by these vulnerabilities, earlier versions don't include the extraction filter feature. Note that for Python 3.14 or later the default value of filter= changed from "no filtering" to `"data", so if you are relying on this new default behavior then your usage is also affected. Note that none of these vulnerabilities significantly affect the installation of source distributions which are tar archives as source distributions already allow arbitrary code execution during the build process. However when evaluating source distributions it's important to avoid installing source distributions with suspicious links.
CVE-2025-4138
Allows the extraction filter to be ignored, allowing symlink targets to point outside the destination directory, and the modification of some file metadata. You are affected by this vulnerability if using the tarfile module to extract untrusted tar archives using TarFile.extractall() or TarFile.extract() using the filter= parameter with a value of "data" or "tar". See the tarfile extraction filters documentation https://docs.python.org/3/library/tarfile.html#tarfile-extraction-filter  for more information. Note that for Python 3.14 or later the default value of filter= changed from "no filtering" to `"data", so if you are relying on this new default behavior then your usage is also affected. Note that none of these vulnerabilities significantly affect the installation of source distributions which are tar archives as source distributions already allow arbitrary code execution during the build process. However when evaluating source distributions it's important to avoid installing source distributions with suspicious links.
CVE-2025-4330
Allows the extraction filter to be ignored, allowing symlink targets to point outside the destination directory, and the modification of some file metadata. You are affected by this vulnerability if using the tarfile module to extract untrusted tar archives using TarFile.extractall() or TarFile.extract() using the filter= parameter with a value of "data" or "tar". See the tarfile extraction filters documentation https://docs.python.org/3/library/tarfile.html#tarfile-extraction-filter  for more information. Note that for Python 3.14 or later the default value of filter= changed from "no filtering" to `"data", so if you are relying on this new default behavior then your usage is also affected. Note that none of these vulnerabilities significantly affect the installation of source distributions which are tar archives as source distributions already allow arbitrary code execution during the build process. However when evaluating source distributions it's important to avoid installing source distributions with suspicious links.
CVE-2025-4435
When using a TarFile.errorlevel = 0 and extracting with a filter the documented behavior is that any filtered members would be skipped and not extracted. However the actual behavior of TarFile.errorlevel = 0 in affected versions is that the member would still be extracted and not skipped.
CVE-2025-4517
Allows arbitrary filesystem writes outside the extraction directory during extraction with filter="data". You are affected by this vulnerability if using the tarfile module to extract untrusted tar archives using TarFile.extractall() or TarFile.extract() using the filter= parameter with a value of "data" or "tar". See the tarfile extraction filters documentation https://docs.python.org/3/library/tarfile.html#tarfile-extraction-filter  for more information. Note that for Python 3.14 or later the default value of filter= changed from "no filtering" to `"data", so if you are relying on this new default behavior then your usage is also affected. Note that none of these vulnerabilities significantly affect the installation of source distributions which are tar archives as source distributions already allow arbitrary code execution during the build process. However when evaluating source distributions it's important to avoid installing source distributions with suspicious links.

Solution: 

Update packages.

Additional Info: 

N/A

Download: 

SRPMS
  1. python3.11-3.11.13-1.el8_10.src.rpm
    MD5: cf6d105a6d1746c9125804479601a480
    SHA-256: 6fa54a6d0bbe95244dfd6d1616a3aa4aec913528df51b00002f75a0851ecb2ed
    Size: 19.26 MB

Asianux Server 8 for x86_64
  1. python3.11-3.11.13-1.el8_10.i686.rpm
    MD5: a3a1c303a650b1700e3c38a650370cbb
    SHA-256: 87d497886e08d2c002c221d33f21d608cb0f74ec1c388e62d6bac30280a637db
    Size: 30.57 kB
  2. python3.11-3.11.13-1.el8_10.x86_64.rpm
    MD5: d565d41265ec8cc0294a265936fbcb04
    SHA-256: a5c2172ef68ddf5814da57a4536197ed32a063cfc534b20a2ca0af813944baf4
    Size: 30.48 kB
  3. python3.11-debug-3.11.13-1.el8_10.i686.rpm
    MD5: dd7dd3fb2f788893102126174c3690fe
    SHA-256: 2beffdb6689174d34a2576c2160dd1440c6a217bb5f7f2332b644796c60c85a9
    Size: 3.20 MB
  4. python3.11-debug-3.11.13-1.el8_10.x86_64.rpm
    MD5: 227dc1bc24202eea4ba5200b91b1ed0f
    SHA-256: 7b2a348d3a873c403452474a3804bcff67b1477d8f9271346d18b684bcc1d4a3
    Size: 3.33 MB
  5. python3.11-devel-3.11.13-1.el8_10.i686.rpm
    MD5: ad13ea72e93596173cf005bd5b677db6
    SHA-256: 7413045db45f313f5cd8c03bfecb7b96e7f5d1c001c9c6d9d3d7acaaa90434d7
    Size: 248.59 kB
  6. python3.11-devel-3.11.13-1.el8_10.x86_64.rpm
    MD5: 151e7a05c1eb6895dc1a479815bdc985
    SHA-256: c80457679e274bafc0bd9f1b4ba4378c57c8b4332adb488388793b10047fed07
    Size: 248.57 kB
  7. python3.11-idle-3.11.13-1.el8_10.i686.rpm
    MD5: 55798859d83a8e7effba3c20c85c579f
    SHA-256: 64f63a7a33fc1fddfd62713eedc96e70f8eff801593bbeb697209c1a16368190
    Size: 1.32 MB
  8. python3.11-idle-3.11.13-1.el8_10.x86_64.rpm
    MD5: 1e3401bac8fdd2e62631ebb37e7eac03
    SHA-256: 25bbd5c304b653a9baadf09e1e12c6cca232fdea5bf9ede549017dc258b8bc9a
    Size: 1.32 MB
  9. python3.11-libs-3.11.13-1.el8_10.i686.rpm
    MD5: 0b676f5f1b66b651c4d9197fc496d016
    SHA-256: 8d537de2f8519042c902a91fe8c08a20e3d7662edb43f4b08a9561f85a069baf
    Size: 10.50 MB
  10. python3.11-libs-3.11.13-1.el8_10.x86_64.rpm
    MD5: 9b78491b61e9d0433861698f01e1df5f
    SHA-256: d4c2e0b7c7bbb0ff88a4106cf830228a342ecefd6ac69b2b1f1c82cf8575f7db
    Size: 10.40 MB
  11. python3.11-rpm-macros-3.11.13-1.el8_10.noarch.rpm
    MD5: 9c53a5a1b093bd3f51efba6e54e15a0d
    SHA-256: 8e7a41ee77e38c14fb2b786c7f29990eb25afa4439cc81dcc971b67668214e4b
    Size: 14.94 kB
  12. python3.11-test-3.11.13-1.el8_10.i686.rpm
    MD5: 9742e3ef2da961e834c1c266a690a7d7
    SHA-256: 899ea88384b14f2577dbd061854d0fe7631c4883834c59a063e9af9f783c3b85
    Size: 15.76 MB
  13. python3.11-test-3.11.13-1.el8_10.x86_64.rpm
    MD5: 5f99067ba553f35f6f948ce3e0ee45f6
    SHA-256: d9a564ad484c01285b869bc61744e55b2955f21fbe06cadb92ea67866f3256ea
    Size: 15.75 MB
  14. python3.11-tkinter-3.11.13-1.el8_10.i686.rpm
    MD5: 29ef17c2e97e91ca2e27f1d21f2af353
    SHA-256: 2cbe73dca89c3867719bb2e8c26853790fb48589485ee063ecd2363c500cb779
    Size: 410.62 kB
  15. python3.11-tkinter-3.11.13-1.el8_10.x86_64.rpm
    MD5: ef6be01bc475ceaf05c994d83606e15d
    SHA-256: b8389131e410838d70ad00f7e2d67be13123b16d80ddf9c102e05f86d0272a56
    Size: 409.25 kB