python3.9-3.9.21-2.el9_6.1
エラータID: AXSA:2025-10620:02
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.
Security Fix(es):
* cpython: Tarfile extracts filtered members when errorlevel=0 (CVE-2025-4435)
* cpython: Bypass extraction filter to modify file metadata outside extraction directory (CVE-2024-12718)
* cpython: Extraction filter bypass for linking outside extraction directory (CVE-2025-4330)
* python: cpython: Arbitrary writes via tarfile realpath overflow (CVE-2025-4517)
* cpython: python: Bypassing extraction filter to create symlinks to arbitrary targets outside extraction directory (CVE-2025-4138)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
CVE-2024-12718
Allows modifying some file metadata (e.g. last modified) with filter="data" or file permissions (chmod) with filter="tar" of files outside the extraction directory. You are affected by this vulnerability if using the tarfile module to extract untrusted tar archives using TarFile.extractall() or TarFile.extract() using the filter= parameter with a value of "data" or "tar". See the tarfile extraction filters documentation https://docs.python.org/3/library/tarfile.html#tarfile-extraction-filter for more information. Only Python versions 3.12 or later are affected by these vulnerabilities, earlier versions don't include the extraction filter feature. Note that for Python 3.14 or later the default value of filter= changed from "no filtering" to `"data", so if you are relying on this new default behavior then your usage is also affected. Note that none of these vulnerabilities significantly affect the installation of source distributions which are tar archives as source distributions already allow arbitrary code execution during the build process. However when evaluating source distributions it's important to avoid installing source distributions with suspicious links.
CVE-2025-4138
Allows the extraction filter to be ignored, allowing symlink targets to point outside the destination directory, and the modification of some file metadata. You are affected by this vulnerability if using the tarfile module to extract untrusted tar archives using TarFile.extractall() or TarFile.extract() using the filter= parameter with a value of "data" or "tar". See the tarfile extraction filters documentation https://docs.python.org/3/library/tarfile.html#tarfile-extraction-filter for more information. Note that for Python 3.14 or later the default value of filter= changed from "no filtering" to `"data", so if you are relying on this new default behavior then your usage is also affected. Note that none of these vulnerabilities significantly affect the installation of source distributions which are tar archives as source distributions already allow arbitrary code execution during the build process. However when evaluating source distributions it's important to avoid installing source distributions with suspicious links.
CVE-2025-4330
Allows the extraction filter to be ignored, allowing symlink targets to point outside the destination directory, and the modification of some file metadata. You are affected by this vulnerability if using the tarfile module to extract untrusted tar archives using TarFile.extractall() or TarFile.extract() using the filter= parameter with a value of "data" or "tar". See the tarfile extraction filters documentation https://docs.python.org/3/library/tarfile.html#tarfile-extraction-filter for more information. Note that for Python 3.14 or later the default value of filter= changed from "no filtering" to `"data", so if you are relying on this new default behavior then your usage is also affected. Note that none of these vulnerabilities significantly affect the installation of source distributions which are tar archives as source distributions already allow arbitrary code execution during the build process. However when evaluating source distributions it's important to avoid installing source distributions with suspicious links.
CVE-2025-4435
When using a TarFile.errorlevel = 0 and extracting with a filter the documented behavior is that any filtered members would be skipped and not extracted. However the actual behavior of TarFile.errorlevel = 0 in affected versions is that the member would still be extracted and not skipped.
CVE-2025-4517
Allows arbitrary filesystem writes outside the extraction directory during extraction with filter="data". You are affected by this vulnerability if using the tarfile module to extract untrusted tar archives using TarFile.extractall() or TarFile.extract() using the filter= parameter with a value of "data" or "tar". See the tarfile extraction filters documentation https://docs.python.org/3/library/tarfile.html#tarfile-extraction-filter for more information. Note that for Python 3.14 or later the default value of filter= changed from "no filtering" to `"data", so if you are relying on this new default behavior then your usage is also affected. Note that none of these vulnerabilities significantly affect the installation of source distributions which are tar archives as source distributions already allow arbitrary code execution during the build process. However when evaluating source distributions it's important to avoid installing source distributions with suspicious links.
Update packages.
Allows modifying some file metadata (e.g. last modified) with filter="data" or file permissions (chmod) with filter="tar" of files outside the extraction directory. You are affected by this vulnerability if using the tarfile module to extract untrusted tar archives using TarFile.extractall() or TarFile.extract() using the filter= parameter with a value of "data" or "tar". See the tarfile extraction filters documentation https://docs.python.org/3/library/tarfile.html#tarfile-extraction-filter for more information. Only Python versions 3.12 or later are affected by these vulnerabilities, earlier versions don't include the extraction filter feature. Note that for Python 3.14 or later the default value of filter= changed from "no filtering" to `"data", so if you are relying on this new default behavior then your usage is also affected. Note that none of these vulnerabilities significantly affect the installation of source distributions which are tar archives as source distributions already allow arbitrary code execution during the build process. However when evaluating source distributions it's important to avoid installing source distributions with suspicious links.
Allows the extraction filter to be ignored, allowing symlink targets to point outside the destination directory, and the modification of some file metadata. You are affected by this vulnerability if using the tarfile module to extract untrusted tar archives using TarFile.extractall() or TarFile.extract() using the filter= parameter with a value of "data" or "tar". See the tarfile extraction filters documentation https://docs.python.org/3/library/tarfile.html#tarfile-extraction-filter for more information. Note that for Python 3.14 or later the default value of filter= changed from "no filtering" to `"data", so if you are relying on this new default behavior then your usage is also affected. Note that none of these vulnerabilities significantly affect the installation of source distributions which are tar archives as source distributions already allow arbitrary code execution during the build process. However when evaluating source distributions it's important to avoid installing source distributions with suspicious links.
Allows the extraction filter to be ignored, allowing symlink targets to point outside the destination directory, and the modification of some file metadata. You are affected by this vulnerability if using the tarfile module to extract untrusted tar archives using TarFile.extractall() or TarFile.extract() using the filter= parameter with a value of "data" or "tar". See the tarfile extraction filters documentation https://docs.python.org/3/library/tarfile.html#tarfile-extraction-filter for more information. Note that for Python 3.14 or later the default value of filter= changed from "no filtering" to `"data", so if you are relying on this new default behavior then your usage is also affected. Note that none of these vulnerabilities significantly affect the installation of source distributions which are tar archives as source distributions already allow arbitrary code execution during the build process. However when evaluating source distributions it's important to avoid installing source distributions with suspicious links.
When using a TarFile.errorlevel = 0 and extracting with a filter the documented behavior is that any filtered members would be skipped and not extracted. However the actual behavior of TarFile.errorlevel = 0 in affected versions is that the member would still be extracted and not skipped.
Allows arbitrary filesystem writes outside the extraction directory during extraction with filter="data". You are affected by this vulnerability if using the tarfile module to extract untrusted tar archives using TarFile.extractall() or TarFile.extract() using the filter= parameter with a value of "data" or "tar". See the tarfile extraction filters documentation https://docs.python.org/3/library/tarfile.html#tarfile-extraction-filter for more information. Note that for Python 3.14 or later the default value of filter= changed from "no filtering" to `"data", so if you are relying on this new default behavior then your usage is also affected. Note that none of these vulnerabilities significantly affect the installation of source distributions which are tar archives as source distributions already allow arbitrary code execution during the build process. However when evaluating source distributions it's important to avoid installing source distributions with suspicious links.
N/A
SRPMS
- python3.9-3.9.21-2.el9_6.1.src.rpm
MD5: 7ba969378b610d858621a68c344fd551
SHA-256: 1ad3a734c59462b08557b45602b61736ebbbed23a58d8e2ac7ea15f96df822c0
Size: 19.36 MB
Asianux Server 9 for x86_64
- python3-3.9.21-2.el9_6.1.i686.rpm
MD5: 690eec555ec40bb8b1a6e6bedf459755
SHA-256: 9a80b2c89fadf71dd9755d0e58e09accefd5828939e4e04f7371c1d9e7876517
Size: 25.85 kB - python3-3.9.21-2.el9_6.1.x86_64.rpm
MD5: 94951f274fdc2f45832e5706198c49a1
SHA-256: dee6f0a2dcc8e1b119b4c68c590c96759cb2272e7cc60667abd2a4dff8bfa03e
Size: 25.79 kB - python3-debug-3.9.21-2.el9_6.1.i686.rpm
MD5: 00f65de0cb2af198ecb7a5e93e6fe0c5
SHA-256: 95b87aed88f8badea19d6e09945a0d9e9f0f2e047e1d5d7885792237e4323b99
Size: 2.88 MB - python3-debug-3.9.21-2.el9_6.1.x86_64.rpm
MD5: e7ac6e1bf92b6d1d97db81b5e85b8754
SHA-256: 194125f5631dd325f68bc5f5f9cf58a13be51849dea63bb5c2f4891bf5edde42
Size: 3.04 MB - python3-devel-3.9.21-2.el9_6.1.i686.rpm
MD5: 2ba4bb92d6b253dd0c53f27596b7ce96
SHA-256: 3f07d3d7d0d608f156d7cebb59839894a2b02c43c3aeeb02838a29e3dada0d5b
Size: 245.08 kB - python3-devel-3.9.21-2.el9_6.1.x86_64.rpm
MD5: 7a805796a65dc0b94630f87800ae81da
SHA-256: d1608e416d389ac4c1bbeec49515f660bdc8141aac13e4018eae797ba19a5bdd
Size: 244.97 kB - python3-idle-3.9.21-2.el9_6.1.i686.rpm
MD5: dd21e75824274e8bde7d787c21125b83
SHA-256: ea83d3dfb657f36f19a18e9838345750a8c167babd3e8c4309ea251f9a457530
Size: 888.75 kB - python3-idle-3.9.21-2.el9_6.1.x86_64.rpm
MD5: 80047e963a3bb0238978375316455429
SHA-256: 602b9b67729ae339472fd51b517735cf1ac0cdc1a6bf9e337fbba9540de40e50
Size: 888.84 kB - python3-libs-3.9.21-2.el9_6.1.i686.rpm
MD5: 3bce6c721e9ccb57e2a2b1ebadb56248
SHA-256: 75c2e33ed70f2a2fed404294d9f274f5e1058f964e2151e9402b476cb7ea5ae1
Size: 8.11 MB - python3-libs-3.9.21-2.el9_6.1.x86_64.rpm
MD5: fa4e71fb4509f8239286c7821aa9c8ee
SHA-256: ef74bf912c7f2507f4b2960a2a059dbf8b58bc3f8cba9336e5081d9b502c4d8f
Size: 8.05 MB - python3-test-3.9.21-2.el9_6.1.i686.rpm
MD5: 0eb783680c5c808197344a63a9fa099e
SHA-256: 7e28ba6ad8d9f187c84106f42cbbc9b38009f12019d9be1516f439ca7f8cf9d7
Size: 10.20 MB - python3-test-3.9.21-2.el9_6.1.x86_64.rpm
MD5: 69ddd3b130edd655b47253a61b4d2d55
SHA-256: 81a6afa1b6ccaf9dc1627244f8895d5b55b6428f13b7b0ba3ea5bb493b43cb69
Size: 10.19 MB - python3-tkinter-3.9.21-2.el9_6.1.i686.rpm
MD5: 56331ac46967f7037bc4468b25e157c4
SHA-256: f3e889eec82ee0418a40684de8bbbf765301e64d07255a86b14457e30a06365b
Size: 343.54 kB - python3-tkinter-3.9.21-2.el9_6.1.x86_64.rpm
MD5: 2d5f69f4e86c24f3af2738822ffdab3f
SHA-256: 7728f925bff10a058608ee073444ae520dcb3de2c3a703642b7778435ede4476
Size: 341.81 kB - python-unversioned-command-3.9.21-2.el9_6.1.noarch.rpm
MD5: 9fc0f5c1e09b6e8783efdc3362e7f58e
SHA-256: e0d66ce06e14f95eb15c8083ed7c775a45d0e26d0d696d0842d797e12355052c
Size: 8.96 kB