Debian Pypy3 vulnerabilities

62 known vulnerabilities affecting debian/pypy3.

Total CVEs
62
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
CRITICAL5HIGH19MEDIUM26LOW12

Vulnerabilities

Page 2 of 4
CVE-2025-4330LOWCVSS 7.5fixed in pypy3 7.3.20+dfsg-2 (forky)2025
CVE-2025-4330 [HIGH] CVE-2025-4330: jython - Allows the extraction filter to be ignored, allowing symlink targets to point ou... Allows the extraction filter to be ignored, allowing symlink targets to point outside the destination directory, and the modification of some file metadata. You are affected by this vulnerability if using the tarfile module to extract untrusted tar archives using TarFile.extractall() or TarFile.extract() using the filter= parameter with a value of "data" or "tar". See
debian
CVE-2025-6075LOWCVSS 1.8fixed in python3.13 3.13.11-1 (forky)2025
CVE-2025-6075 [LOW] CVE-2025-6075: pypy3 - If the value passed to os.path.expandvars() is user-controlled a performance de... If the value passed to os.path.expandvars() is user-controlled a performance degradation is possible when expanding environment variables. Scope: local bookworm: open bullseye: open forky: open sid: open trixie: open
debian
CVE-2025-4435LOWCVSS 7.5fixed in pypy3 7.3.20+dfsg-2 (forky)2025
CVE-2025-4435 [HIGH] CVE-2025-4435: jython - When using a TarFile.errorlevel = 0 and extracting with a filter the documented ... When using a TarFile.errorlevel = 0 and extracting with a filter the documented behavior is that any filtered members would be skipped and not extracted. However the actual behavior of TarFile.errorlevel = 0 in affected versions is that the member would still be extracted and not skipped. Scope: local bookworm: resolved bullseye: resolved forky: resolved sid: resolved
debian
CVE-2025-4516LOWCVSS 5.9fixed in python3.13 3.13.3-4 (forky)2025
CVE-2025-4516 [MEDIUM] CVE-2025-4516: pypy3 - There is an issue in CPython when using `bytes.decode("unicode_escape", error="i... There is an issue in CPython when using `bytes.decode("unicode_escape", error="ignore|replace")`. If you are not using the "unicode_escape" encoding or an error handler your usage is not affected. To work-around this issue you may stop using the error= handler and instead wrap the bytes.decode() call in a try-except catching the DecodeError. Scope: local bookworm: res
debian
CVE-2025-13837LOWCVSS 2.1fixed in python3.13 3.13.11-1 (forky)2025
CVE-2025-13837 [LOW] CVE-2025-13837: pypy3 - When loading a plist file, the plistlib module reads data in size specified by t... When loading a plist file, the plistlib module reads data in size specified by the file itself, meaning a malicious file can cause OOM and DoS issues Scope: local bookworm: open bullseye: open forky: open sid: open trixie: open
debian
CVE-2025-4138LOWCVSS 7.5fixed in pypy3 7.3.20+dfsg-2 (forky)2025
CVE-2025-4138 [HIGH] CVE-2025-4138: jython - Allows the extraction filter to be ignored, allowing symlink targets to point ou... Allows the extraction filter to be ignored, allowing symlink targets to point outside the destination directory, and the modification of some file metadata. You are affected by this vulnerability if using the tarfile module to extract untrusted tar archives using TarFile.extractall() or TarFile.extract() using the filter= parameter with a value of "data" or "tar". See
debian
CVE-2025-4517LOWCVSS 9.4fixed in pypy3 7.3.20+dfsg-2 (forky)2025
CVE-2025-4517 [CRITICAL] CVE-2025-4517: jython - Allows arbitrary filesystem writes outside the extraction directory during extra... Allows arbitrary filesystem writes outside the extraction directory during extraction with filter="data". You are affected by this vulnerability if using the tarfile module to extract untrusted tar archives using TarFile.extractall() or TarFile.extract() using the filter= parameter with a value of "data" or "tar". See the tarfile extraction filters documentation ht
debian
CVE-2024-5642CRITICALCVSS 9.1fixed in pypy3 7.3.10+dfsg-1 (bookworm)2024
CVE-2024-5642 [CRITICAL] CVE-2024-5642: pypy3 - CPython 3.9 and earlier doesn't disallow configuring an empty list ("[]") for SS... CPython 3.9 and earlier doesn't disallow configuring an empty list ("[]") for SSLContext.set_npn_protocols() which is an invalid value for the underlying OpenSSL API. This results in a buffer over-read when NPN is used (see CVE-2024-5535 for OpenSSL). This vulnerability is of low severity due to NPN being not widely used and specifying an empty list likely being unc
debian
CVE-2024-0397HIGHCVSS 7.4fixed in pypy3 7.3.16+dfsg-1 (forky)2024
CVE-2024-0397 [HIGH] CVE-2024-0397: pypy3 - A defect was discovered in the Python “ssl” module where there is a memory race ... A defect was discovered in the Python “ssl” module where there is a memory race condition with the ssl.SSLContext methods “cert_store_stats()” and “get_ca_certs()”. The race condition can be triggered if the methods are called at the same time as certificates are loaded into the SSLContext, such as during the TLS handshake with a certificate directory configured. This i
debian
CVE-2024-8088HIGHCVSS 8.7fixed in pypy3 7.3.18+dfsg-1 (forky)2024
CVE-2024-8088 [HIGH] CVE-2024-8088: pypy3 - There is a HIGH severity vulnerability affecting the CPython "zipfile" module af... There is a HIGH severity vulnerability affecting the CPython "zipfile" module affecting "zipfile.Path". Note that the more common API "zipfile.ZipFile" class is unaffected. When iterating over names of entries in a zip archive (for example, methods of "zipfile.Path" like "namelist()", "iterdir()", etc) the process can be put into an infinite loop with a maliciously craf
debian
CVE-2024-7592HIGHCVSS 7.5fixed in pypy3 7.3.5+dfsg-2+deb11u5 (bullseye)2024
CVE-2024-7592 [HIGH] CVE-2024-7592: pypy3 - There is a LOW severity vulnerability affecting CPython, specifically the 'http.... There is a LOW severity vulnerability affecting CPython, specifically the 'http.cookies' standard library module. When parsing cookies that contained backslashes for quoted characters in the cookie value, the parser would use an algorithm with quadratic complexity, resulting in excess CPU resources being used while parsing the value. Scope: local bookworm: open bullseye
debian
CVE-2024-6232HIGHCVSS 7.5fixed in pypy3 7.3.5+dfsg-2+deb11u5 (bullseye)2024
CVE-2024-6232 [HIGH] CVE-2024-6232: pypy3 - There is a MEDIUM severity vulnerability affecting CPython. Regular express... There is a MEDIUM severity vulnerability affecting CPython. Regular expressions that allowed excessive backtracking during tarfile.TarFile header parsing are vulnerable to ReDoS via specifically-crafted tar archives. Scope: local bookworm: open bullseye: resolved (fixed in 7.3.5+dfsg-2+deb11u5) forky: resolved (fixed in 7.3.18+dfsg-1) sid: resolved (fixed in 7.3.18+dfsg
debian
CVE-2024-4032HIGHCVSS 7.5fixed in pypy3 7.3.18+dfsg-1 (forky)2024
CVE-2024-4032 [HIGH] CVE-2024-4032: pypy3 - The “ipaddress” module contained incorrect information about whether certain IPv... The “ipaddress” module contained incorrect information about whether certain IPv4 and IPv6 addresses were designated as “globally reachable” or “private”. This affected the is_private and is_global properties of the ipaddress.IPv4Address, ipaddress.IPv4Network, ipaddress.IPv6Address, and ipaddress.IPv6Network classes, where values wouldn’t be returned in accordance with
debian
CVE-2024-6923MEDIUMCVSS 5.5fixed in pypy3 7.3.5+dfsg-2+deb11u5 (bullseye)2024
CVE-2024-6923 [MEDIUM] CVE-2024-6923: pypy3 - There is a MEDIUM severity vulnerability affecting CPython. The email module d... There is a MEDIUM severity vulnerability affecting CPython. The email module didn’t properly quote newlines for email headers when serializing an email message allowing for header injection when an email is serialized. Scope: local bookworm: open bullseye: resolved (fixed in 7.3.5+dfsg-2+deb11u5) forky: resolved (fixed in 7.3.18+dfsg-1) sid: resolved (fixed in 7.3.18+
debian
CVE-2024-0450MEDIUMCVSS 6.2fixed in pypy3 7.3.11+dfsg-2+deb12u2 (bookworm)2024
CVE-2024-0450 [MEDIUM] CVE-2024-0450: pypy3 - An issue was found in the CPython `zipfile` module affecting versions 3.12.1, 3.... An issue was found in the CPython `zipfile` module affecting versions 3.12.1, 3.11.7, 3.10.13, 3.9.18, and 3.8.18 and prior. The zipfile module is vulnerable to “quoted-overlap” zip-bombs which exploit the zip format to create a zip-bomb with a high compression ratio. The fixed versions of CPython makes the zipfile module reject zip archives which overlap entries in t
debian
CVE-2024-11168MEDIUMCVSS 6.3fixed in pypy3 7.3.5+dfsg-2+deb11u5 (bullseye)2024
CVE-2024-11168 [MEDIUM] CVE-2024-11168: pypy3 - The urllib.parse.urlsplit() and urlparse() functions improperly validated bracke... The urllib.parse.urlsplit() and urlparse() functions improperly validated bracketed hosts (`[]`), allowing hosts that weren't IPv6 or IPvFuture. This behavior was not conformant to RFC 3986 and potentially enabled SSRF if a URL is processed by more than one URL parser. Scope: local bookworm: open bullseye: resolved (fixed in 7.3.5+dfsg-2+deb11u5) forky: resolved (fi
debian
CVE-2024-9287MEDIUMCVSS 5.3fixed in pypy3 7.3.11+dfsg-2+deb12u3 (bookworm)2024
CVE-2024-9287 [MEDIUM] CVE-2024-9287: pypy3 - A vulnerability has been found in the CPython `venv` module and CLI where path n... A vulnerability has been found in the CPython `venv` module and CLI where path names provided when creating a virtual environment were not quoted properly, allowing the creator to inject commands into virtual environment "activation" scripts (ie "source venv/bin/activate"). This means that attacker-controlled virtual environments are able to run commands when the virt
debian
CVE-2024-12718LOWCVSS 5.3fixed in pypy3 7.3.20+dfsg-2 (forky)2024
CVE-2024-12718 [MEDIUM] CVE-2024-12718: jython - Allows modifying some file metadata (e.g. last modified) with filter="data" or f... Allows modifying some file metadata (e.g. last modified) with filter="data" or file permissions (chmod) with filter="tar" of files outside the extraction directory. You are affected by this vulnerability if using the tarfile module to extract untrusted tar archives using TarFile.extractall() or TarFile.extract() using the filter= parameter with a value of "data" or
debian
CVE-2023-6597HIGHCVSS 7.8fixed in pypy3 7.3.11+dfsg-2+deb12u2 (bookworm)2023
CVE-2023-6597 [HIGH] CVE-2023-6597: pypy3 - An issue was found in the CPython `tempfile.TemporaryDirectory` class affecting ... An issue was found in the CPython `tempfile.TemporaryDirectory` class affecting versions 3.12.1, 3.11.7, 3.10.13, 3.9.18, and 3.8.18 and prior. The tempfile.TemporaryDirectory class would dereference symlinks during cleanup of permissions-related errors. This means users which can run privileged programs are potentially able to modify permissions of files referenced by
debian
CVE-2023-24329HIGHCVSS 7.5fixed in pypy3 7.3.11+dfsg-2+deb12u2 (bookworm)2023
CVE-2023-24329 [HIGH] CVE-2023-24329: pypy3 - An issue in the urllib.parse component of Python before 3.11.4 allows attackers ... An issue in the urllib.parse component of Python before 3.11.4 allows attackers to bypass blocklisting methods by supplying a URL that starts with blank characters. Scope: local bookworm: resolved (fixed in 7.3.11+dfsg-2+deb12u2) bullseye: resolved (fixed in 7.3.5+dfsg-2+deb11u3) forky: resolved (fixed in 7.3.12+dfsg-1) sid: resolved (fixed in 7.3.12+dfsg-1) trixie: r
debian