python3.11-3.11.11-2.el9_6.1
エラータID: AXSA:2025-10624:06
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.
Security Fix(es):
* cpython: Tarfile extracts filtered members when errorlevel=0 (CVE-2025-4435)
* cpython: Bypass extraction filter to modify file metadata outside extraction directory (CVE-2024-12718)
* cpython: Extraction filter bypass for linking outside extraction directory (CVE-2025-4330)
* python: cpython: Arbitrary writes via tarfile realpath overflow (CVE-2025-4517)
* cpython: python: Bypassing extraction filter to create symlinks to arbitrary targets outside extraction directory (CVE-2025-4138)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
CVE-2024-12718
Allows modifying some file metadata (e.g. last modified) with filter="data" or file permissions (chmod) with filter="tar" of files outside the extraction directory. You are affected by this vulnerability if using the tarfile module to extract untrusted tar archives using TarFile.extractall() or TarFile.extract() using the filter= parameter with a value of "data" or "tar". See the tarfile extraction filters documentation https://docs.python.org/3/library/tarfile.html#tarfile-extraction-filter for more information. Only Python versions 3.12 or later are affected by these vulnerabilities, earlier versions don't include the extraction filter feature. Note that for Python 3.14 or later the default value of filter= changed from "no filtering" to `"data", so if you are relying on this new default behavior then your usage is also affected. Note that none of these vulnerabilities significantly affect the installation of source distributions which are tar archives as source distributions already allow arbitrary code execution during the build process. However when evaluating source distributions it's important to avoid installing source distributions with suspicious links.
CVE-2025-4138
Allows the extraction filter to be ignored, allowing symlink targets to point outside the destination directory, and the modification of some file metadata. You are affected by this vulnerability if using the tarfile module to extract untrusted tar archives using TarFile.extractall() or TarFile.extract() using the filter= parameter with a value of "data" or "tar". See the tarfile extraction filters documentation https://docs.python.org/3/library/tarfile.html#tarfile-extraction-filter for more information. Note that for Python 3.14 or later the default value of filter= changed from "no filtering" to `"data", so if you are relying on this new default behavior then your usage is also affected. Note that none of these vulnerabilities significantly affect the installation of source distributions which are tar archives as source distributions already allow arbitrary code execution during the build process. However when evaluating source distributions it's important to avoid installing source distributions with suspicious links.
CVE-2025-4330
Allows the extraction filter to be ignored, allowing symlink targets to point outside the destination directory, and the modification of some file metadata. You are affected by this vulnerability if using the tarfile module to extract untrusted tar archives using TarFile.extractall() or TarFile.extract() using the filter= parameter with a value of "data" or "tar". See the tarfile extraction filters documentation https://docs.python.org/3/library/tarfile.html#tarfile-extraction-filter for more information. Note that for Python 3.14 or later the default value of filter= changed from "no filtering" to `"data", so if you are relying on this new default behavior then your usage is also affected. Note that none of these vulnerabilities significantly affect the installation of source distributions which are tar archives as source distributions already allow arbitrary code execution during the build process. However when evaluating source distributions it's important to avoid installing source distributions with suspicious links.
CVE-2025-4435
When using a TarFile.errorlevel = 0 and extracting with a filter the documented behavior is that any filtered members would be skipped and not extracted. However the actual behavior of TarFile.errorlevel = 0 in affected versions is that the member would still be extracted and not skipped.
CVE-2025-4517
Allows arbitrary filesystem writes outside the extraction directory during extraction with filter="data". You are affected by this vulnerability if using the tarfile module to extract untrusted tar archives using TarFile.extractall() or TarFile.extract() using the filter= parameter with a value of "data" or "tar". See the tarfile extraction filters documentation https://docs.python.org/3/library/tarfile.html#tarfile-extraction-filter for more information. Note that for Python 3.14 or later the default value of filter= changed from "no filtering" to `"data", so if you are relying on this new default behavior then your usage is also affected. Note that none of these vulnerabilities significantly affect the installation of source distributions which are tar archives as source distributions already allow arbitrary code execution during the build process. However when evaluating source distributions it's important to avoid installing source distributions with suspicious links.
Update packages.
Allows modifying some file metadata (e.g. last modified) with filter="data" or file permissions (chmod) with filter="tar" of files outside the extraction directory. You are affected by this vulnerability if using the tarfile module to extract untrusted tar archives using TarFile.extractall() or TarFile.extract() using the filter= parameter with a value of "data" or "tar". See the tarfile extraction filters documentation https://docs.python.org/3/library/tarfile.html#tarfile-extraction-filter for more information. Only Python versions 3.12 or later are affected by these vulnerabilities, earlier versions don't include the extraction filter feature. Note that for Python 3.14 or later the default value of filter= changed from "no filtering" to `"data", so if you are relying on this new default behavior then your usage is also affected. Note that none of these vulnerabilities significantly affect the installation of source distributions which are tar archives as source distributions already allow arbitrary code execution during the build process. However when evaluating source distributions it's important to avoid installing source distributions with suspicious links.
Allows the extraction filter to be ignored, allowing symlink targets to point outside the destination directory, and the modification of some file metadata. You are affected by this vulnerability if using the tarfile module to extract untrusted tar archives using TarFile.extractall() or TarFile.extract() using the filter= parameter with a value of "data" or "tar". See the tarfile extraction filters documentation https://docs.python.org/3/library/tarfile.html#tarfile-extraction-filter for more information. Note that for Python 3.14 or later the default value of filter= changed from "no filtering" to `"data", so if you are relying on this new default behavior then your usage is also affected. Note that none of these vulnerabilities significantly affect the installation of source distributions which are tar archives as source distributions already allow arbitrary code execution during the build process. However when evaluating source distributions it's important to avoid installing source distributions with suspicious links.
Allows the extraction filter to be ignored, allowing symlink targets to point outside the destination directory, and the modification of some file metadata. You are affected by this vulnerability if using the tarfile module to extract untrusted tar archives using TarFile.extractall() or TarFile.extract() using the filter= parameter with a value of "data" or "tar". See the tarfile extraction filters documentation https://docs.python.org/3/library/tarfile.html#tarfile-extraction-filter for more information. Note that for Python 3.14 or later the default value of filter= changed from "no filtering" to `"data", so if you are relying on this new default behavior then your usage is also affected. Note that none of these vulnerabilities significantly affect the installation of source distributions which are tar archives as source distributions already allow arbitrary code execution during the build process. However when evaluating source distributions it's important to avoid installing source distributions with suspicious links.
When using a TarFile.errorlevel = 0 and extracting with a filter the documented behavior is that any filtered members would be skipped and not extracted. However the actual behavior of TarFile.errorlevel = 0 in affected versions is that the member would still be extracted and not skipped.
Allows arbitrary filesystem writes outside the extraction directory during extraction with filter="data". You are affected by this vulnerability if using the tarfile module to extract untrusted tar archives using TarFile.extractall() or TarFile.extract() using the filter= parameter with a value of "data" or "tar". See the tarfile extraction filters documentation https://docs.python.org/3/library/tarfile.html#tarfile-extraction-filter for more information. Note that for Python 3.14 or later the default value of filter= changed from "no filtering" to `"data", so if you are relying on this new default behavior then your usage is also affected. Note that none of these vulnerabilities significantly affect the installation of source distributions which are tar archives as source distributions already allow arbitrary code execution during the build process. However when evaluating source distributions it's important to avoid installing source distributions with suspicious links.
N/A
SRPMS
- python3.11-3.11.11-2.el9_6.1.src.rpm
MD5: 08c9a2f7aff7b1089f9a752ddd0de378
SHA-256: c550b8d0da7d78fe3b23ddf7ce80927632efbfd958877f54f332e6732f558265
Size: 19.24 MB
Asianux Server 9 for x86_64
- python3.11-3.11.11-2.el9_6.1.i686.rpm
MD5: 723f0449258773a4eeee6b7944602421
SHA-256: 8b604daf5895ad412b712d54aebbf09dc841c1f1b46e1b8bf736c4a8e7a7420e
Size: 25.08 kB - python3.11-3.11.11-2.el9_6.1.x86_64.rpm
MD5: fc483ec3f00da11a1e56e6ce73fc50fe
SHA-256: e738fa5ceca1678dfcbaddddbc23a3fa277ba0335ba67d057b3295c544c73c6f
Size: 25.00 kB - python3.11-debug-3.11.11-2.el9_6.1.i686.rpm
MD5: 924ceb59b5a0ffa34bd76aa68b77cb32
SHA-256: 4e6d97161e31acb47c7dd1a4e95275983a2f95060a8d7c13ae518b083f5dcf56
Size: 3.25 MB - python3.11-debug-3.11.11-2.el9_6.1.x86_64.rpm
MD5: 4f679cca0f429dc7815ce31bed6dc054
SHA-256: 93bbaf767688d76a57c718bfa7768c6d88c7cde77a4e1143c96619779dfe9276
Size: 3.40 MB - python3.11-devel-3.11.11-2.el9_6.1.i686.rpm
MD5: 833b1ba84608ccfd76b85977ab6dfb32
SHA-256: 61c4ca9e6af765e17c56ba425d717ce2d59797ffee7e99a63cf991be1653e5dd
Size: 279.88 kB - python3.11-devel-3.11.11-2.el9_6.1.x86_64.rpm
MD5: ecc5091dcb95d5ed3e173a58745ff266
SHA-256: 038e7add54d3f2b2f8de49d2056bb1beba3c2249369346b309da2dcd4a4dd997
Size: 279.81 kB - python3.11-idle-3.11.11-2.el9_6.1.i686.rpm
MD5: 24592490202fae4a30fd53a20679bc9f
SHA-256: 478c61e91e43019e4f8ec15297741331fe61f3005d8f08d4fe5a670c148c8c8e
Size: 1.09 MB - python3.11-idle-3.11.11-2.el9_6.1.x86_64.rpm
MD5: eac1f6e904a5d86218489fbee239404d
SHA-256: efc1aff217d5d877dd43004142185e24b7573d33a9388f24ff6f68ea76e73da4
Size: 1.09 MB - python3.11-libs-3.11.11-2.el9_6.1.i686.rpm
MD5: 476f979013bdc1e5ac6a3833412070fe
SHA-256: ca6637556652784d96d8a7c42d46ac1cba6cd428d59327b9b73fce783a6a028c
Size: 10.24 MB - python3.11-libs-3.11.11-2.el9_6.1.x86_64.rpm
MD5: 038fe599990d72476d4245d6e91a82f4
SHA-256: 4b9a70fdf449674d3645d66e4a3ab7988ad90bd5ae3936b479e11b0921c824d6
Size: 10.17 MB - python3.11-test-3.11.11-2.el9_6.1.i686.rpm
MD5: 4ea60b478cbcf4a58f6f84e28aa71aef
SHA-256: 4500a4dfb17e062de53681a8d979ea9650c5fa75055513d2871900684482a16d
Size: 15.33 MB - python3.11-test-3.11.11-2.el9_6.1.x86_64.rpm
MD5: fc32d8305af4bb6a61b00bec3d757a51
SHA-256: 8604fdf25b31705d5f46ffd0a2ac171343b038cce2a557c265ee620f45e50011
Size: 15.33 MB - python3.11-tkinter-3.11.11-2.el9_6.1.i686.rpm
MD5: f783e32b20491604f393ebff0abc9db5
SHA-256: e92fb532c2650c8e97fc70ff8e0536ec95d25b3e28a474f122d244bb47e3f3a8
Size: 427.61 kB - python3.11-tkinter-3.11.11-2.el9_6.1.x86_64.rpm
MD5: 9ecda965356f9152bc71d00481e79fcd
SHA-256: 5c149f420a95ecbbec45e72b0ad3e6937d1f584b340922250e4803d8e041ebf3
Size: 426.05 kB