Debian Python2.7 vulnerabilities

112 known vulnerabilities affecting debian/python2.7.

Total CVEs
112
CISA KEV
0
Public exploits
5
Exploited in wild
0
Severity breakdown
CRITICAL12HIGH20MEDIUM33LOW47

Vulnerabilities

Page 1 of 6
CVE-2026-4519HIGHCVSS 7.0fixed in python3.14 3.14.4-1 (sid)2026
CVE-2026-4519 [HIGH] CVE-2026-4519: jython - The webbrowser.open() API would accept leading dashes in the URL which could be... The webbrowser.open() API would accept leading dashes in the URL which could be handled as command line options for certain web browsers. New behavior rejects leading dashes. Users are recommended to sanitize URLs prior to passing to webbrowser.open(). Scope: local bookworm: open bullseye: open forky: open sid: open trixie: open
debian
CVE-2026-2297MEDIUMCVSS 5.7fixed in python3.14 3.14.3-4 (sid)2026
CVE-2026-2297 [MEDIUM] CVE-2026-2297: pypy3 - The import hook in CPython that handles legacy *.pyc files (SourcelessFileLoader... The import hook in CPython that handles legacy *.pyc files (SourcelessFileLoader) is incorrectly handled in FileLoader (a base class) and so does not use io.open_code() to read the .pyc files. sys.audit handlers for this audit event therefore do not fire. Scope: local bookworm: open bullseye: open forky: open sid: open trixie: open
debian
CVE-2026-0865MEDIUMCVSS 5.9fixed in python3.13 3.13.12-1 (forky)2026
CVE-2026-0865 [MEDIUM] CVE-2026-0865: jython - User-controlled header names and values containing newlines can allow injecting ... User-controlled header names and values containing newlines can allow injecting HTTP headers. Scope: local bookworm: open bullseye: open forky: open sid: open trixie: open
debian
CVE-2026-4224MEDIUMCVSS 6.0fixed in python3.14 3.14.3-4 (sid)2026
CVE-2026-4224 [MEDIUM] CVE-2026-4224: pypy3 - When an Expat parser with a registered ElementDeclHandler parses an inline docum... When an Expat parser with a registered ElementDeclHandler parses an inline document type definition containing a deeply nested content model a C stack overflow occurs. Scope: local bookworm: open bullseye: open forky: open sid: open trixie: open
debian
CVE-2026-3479LOW2026
CVE-2026-3479 [NONE] CVE-2026-3479: pypy3 - DISPUTED: The project has clarified that the documentation was incorrect, and th... DISPUTED: The project has clarified that the documentation was incorrect, and that pkgutil.get_data() has the same security model as open(). The documentation has been updated to clarify this point. There is no vulnerability in the function if following the intended security model. pkgutil.get_data() did not validate the resource argument as documented, allowing path tr
debian
CVE-2025-69534HIGHCVSS 7.5fixed in python3.13 3.13.4-1 (forky)2025
CVE-2025-69534 [HIGH] CVE-2025-69534: pypy3 - Python-Markdown version 3.8 contain a vulnerability where malformed HTML-like se... Python-Markdown version 3.8 contain a vulnerability where malformed HTML-like sequences can cause html.parser.HTMLParser to raise an unhandled AssertionError during Markdown parsing. Because Python-Markdown does not catch this exception, any application that processes attacker-controlled Markdown may crash. This enables remote, unauthenticated Denial of Service in web
debian
CVE-2025-8194HIGHCVSS 7.5fixed in python3.13 3.13.6-1 (forky)2025
CVE-2025-8194 [HIGH] CVE-2025-8194: pypy3 - There is a defect in the CPython “tarfile” module affecting the “TarFile” extrac... There is a defect in the CPython “tarfile” module affecting the “TarFile” extraction and entry enumeration APIs. The tar implementation would process tar archives with negative offsets without error, resulting in an infinite loop and deadlock during the parsing of maliciously crafted tar archives. This vulnerability can be mitigated by including the following patch afte
debian
CVE-2025-15366MEDIUMCVSS 5.9fixed in python3.9 3.9.2-1+deb11u5 (bullseye)2025
CVE-2025-15366 [MEDIUM] CVE-2025-15366: jython - The imaplib module, when passed a user-controlled command, can have additional c... The imaplib module, when passed a user-controlled command, can have additional commands injected using newlines. Mitigation rejects commands containing control characters. Scope: local bookworm: open bullseye: open forky: open sid: open trixie: open
debian
CVE-2025-12084MEDIUMCVSS 6.3fixed in python3.13 3.13.11-1 (forky)2025
CVE-2025-12084 [MEDIUM] CVE-2025-12084: jython - When building nested elements using xml.dom.minidom methods such as appendChild(... When building nested elements using xml.dom.minidom methods such as appendChild() that have a dependency on _clear_id_cache() the algorithm is quadratic. Availability can be impacted when building excessively nested documents. Scope: local bookworm: open bullseye: open forky: open sid: open trixie: open
debian
CVE-2025-6069MEDIUMCVSS 4.3fixed in pypy3 7.3.5+dfsg-2+deb11u5 (bullseye)2025
CVE-2025-6069 [MEDIUM] CVE-2025-6069: jython - The html.parser.HTMLParser class had worse-case quadratic complexity when proces... The html.parser.HTMLParser class had worse-case quadratic complexity when processing certain crafted malformed inputs potentially leading to amplified denial-of-service. Scope: local bookworm: open bullseye: open forky: open sid: open trixie: open
debian
CVE-2025-15282MEDIUMCVSS 6.0fixed in python3.13 3.13.12-1 (forky)2025
CVE-2025-15282 [MEDIUM] CVE-2025-15282: pypy3 - User-controlled data URLs parsed by urllib.request.DataHandler allow injecting h... User-controlled data URLs parsed by urllib.request.DataHandler allow injecting headers through newlines in the data URL mediatype. Scope: local bookworm: open bullseye: open forky: open sid: open trixie: open
debian
CVE-2025-15367MEDIUMCVSS 5.9fixed in python3.9 3.9.2-1+deb11u5 (bullseye)2025
CVE-2025-15367 [MEDIUM] CVE-2025-15367: jython - The poplib module, when passed a user-controlled command, can have additional co... The poplib module, when passed a user-controlled command, can have additional commands injected using newlines. Mitigation rejects commands containing control characters. Scope: local bookworm: open bullseye: open forky: open sid: open trixie: open
debian
CVE-2025-11468LOWCVSS 5.7fixed in python3.13 3.13.12-1 (forky)2025
CVE-2025-11468 [MEDIUM] CVE-2025-11468: jython - When folding a long comment in an email header containing exclusively unfoldable... When folding a long comment in an email header containing exclusively unfoldable characters, the parenthesis would not be preserved. This could be used for injecting headers into email messages where addresses are user-controlled and not sanitized. Scope: local bookworm: resolved bullseye: resolved forky: resolved sid: resolved trixie: resolved
debian
CVE-2025-4330LOWCVSS 7.5fixed in pypy3 7.3.20+dfsg-2 (forky)2025
CVE-2025-4330 [HIGH] CVE-2025-4330: jython - Allows the extraction filter to be ignored, allowing symlink targets to point ou... Allows the extraction filter to be ignored, allowing symlink targets to point outside the destination directory, and the modification of some file metadata. You are affected by this vulnerability if using the tarfile module to extract untrusted tar archives using TarFile.extractall() or TarFile.extract() using the filter= parameter with a value of "data" or "tar". See
debian
CVE-2025-4435LOWCVSS 7.5fixed in pypy3 7.3.20+dfsg-2 (forky)2025
CVE-2025-4435 [HIGH] CVE-2025-4435: jython - When using a TarFile.errorlevel = 0 and extracting with a filter the documented ... When using a TarFile.errorlevel = 0 and extracting with a filter the documented behavior is that any filtered members would be skipped and not extracted. However the actual behavior of TarFile.errorlevel = 0 in affected versions is that the member would still be extracted and not skipped. Scope: local bookworm: resolved bullseye: resolved forky: resolved sid: resolved
debian
CVE-2025-13462LOWCVSS 2.0fixed in python3.14 3.14.3-4 (sid)2025
CVE-2025-13462 [LOW] CVE-2025-13462: python2.7 - The "tarfile" module would still apply normalization of AREGTYPE (\x00) blocks t... The "tarfile" module would still apply normalization of AREGTYPE (\x00) blocks to DIRTYPE, even while processing a multi-block member such as GNUTYPE_LONGNAME or GNUTYPE_LONGLINK. This could result in a crafted tar archive being misinterpreted by the tarfile module compared to other implementations. Scope: local bullseye: open
debian
CVE-2025-4138LOWCVSS 7.5fixed in pypy3 7.3.20+dfsg-2 (forky)2025
CVE-2025-4138 [HIGH] CVE-2025-4138: jython - Allows the extraction filter to be ignored, allowing symlink targets to point ou... Allows the extraction filter to be ignored, allowing symlink targets to point outside the destination directory, and the modification of some file metadata. You are affected by this vulnerability if using the tarfile module to extract untrusted tar archives using TarFile.extractall() or TarFile.extract() using the filter= parameter with a value of "data" or "tar". See
debian
CVE-2025-4517LOWCVSS 9.4fixed in pypy3 7.3.20+dfsg-2 (forky)2025
CVE-2025-4517 [CRITICAL] CVE-2025-4517: jython - Allows arbitrary filesystem writes outside the extraction directory during extra... Allows arbitrary filesystem writes outside the extraction directory during extraction with filter="data". You are affected by this vulnerability if using the tarfile module to extract untrusted tar archives using TarFile.extractall() or TarFile.extract() using the filter= parameter with a value of "data" or "tar". See the tarfile extraction filters documentation ht
debian
CVE-2024-5642CRITICALCVSS 9.1fixed in pypy3 7.3.10+dfsg-1 (bookworm)2024
CVE-2024-5642 [CRITICAL] CVE-2024-5642: pypy3 - CPython 3.9 and earlier doesn't disallow configuring an empty list ("[]") for SS... CPython 3.9 and earlier doesn't disallow configuring an empty list ("[]") for SSLContext.set_npn_protocols() which is an invalid value for the underlying OpenSSL API. This results in a buffer over-read when NPN is used (see CVE-2024-5535 for OpenSSL). This vulnerability is of low severity due to NPN being not widely used and specifying an empty list likely being unc
debian
CVE-2024-0397HIGHCVSS 7.4fixed in pypy3 7.3.16+dfsg-1 (forky)2024
CVE-2024-0397 [HIGH] CVE-2024-0397: pypy3 - A defect was discovered in the Python “ssl” module where there is a memory race ... A defect was discovered in the Python “ssl” module where there is a memory race condition with the ssl.SSLContext methods “cert_store_stats()” and “get_ca_certs()”. The race condition can be triggered if the methods are called at the same time as certificates are loaded into the SSLContext, such as during the TLS handshake with a certificate directory configured. This i
debian