Debian Python3.9 vulnerabilities

75 known vulnerabilities affecting debian/python3.9.

Total CVEs
75
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
CRITICAL6HIGH19MEDIUM27LOW23

Vulnerabilities

Page 1 of 4
CVE-2026-4519HIGHCVSS 7.0fixed in python3.14 3.14.4-1 (sid)2026
CVE-2026-4519 [HIGH] CVE-2026-4519: jython - The webbrowser.open() API would accept leading dashes in the URL which could be... The webbrowser.open() API would accept leading dashes in the URL which could be handled as command line options for certain web browsers. New behavior rejects leading dashes. Users are recommended to sanitize URLs prior to passing to webbrowser.open(). Scope: local bookworm: open bullseye: open forky: open sid: open trixie: open
debian
CVE-2026-0672MEDIUMCVSS 6.0fixed in python3.13 3.13.12-1 (forky)2026
CVE-2026-0672 [MEDIUM] CVE-2026-0672: pypy3 - When using http.cookies.Morsel, user-controlled cookie values and parameters can... When using http.cookies.Morsel, user-controlled cookie values and parameters can allow injecting HTTP headers into messages. Patch rejects all control characters within cookie names, values, and parameters. Scope: local bookworm: open bullseye: open forky: open sid: open trixie: open
debian
CVE-2026-1299MEDIUMCVSS 6.0fixed in python3.13 3.13.12-1 (forky)2026
CVE-2026-1299 [MEDIUM] CVE-2026-1299: pypy3 - The email module, specifically the "BytesGenerator" class, didn’t properly quot... The email module, specifically the "BytesGenerator" class, didn’t properly quote newlines for email headers when serializing an email message allowing for header injection when an email is serialized. This is only applicable if using "LiteralHeader" writing headers that don't respect email folding rules, the new behavior will reject the incorrectly folded headers in "
debian
CVE-2026-2297MEDIUMCVSS 5.7fixed in python3.14 3.14.3-4 (sid)2026
CVE-2026-2297 [MEDIUM] CVE-2026-2297: pypy3 - The import hook in CPython that handles legacy *.pyc files (SourcelessFileLoader... The import hook in CPython that handles legacy *.pyc files (SourcelessFileLoader) is incorrectly handled in FileLoader (a base class) and so does not use io.open_code() to read the .pyc files. sys.audit handlers for this audit event therefore do not fire. Scope: local bookworm: open bullseye: open forky: open sid: open trixie: open
debian
CVE-2026-3644MEDIUMCVSS 6.0fixed in python3.14 3.14.3-4 (sid)2026
CVE-2026-3644 [MEDIUM] CVE-2026-3644: python3.11 - The fix for CVE-2026-0672, which rejected control characters in http.cookies.Mor... The fix for CVE-2026-0672, which rejected control characters in http.cookies.Morsel, was incomplete. The Morsel.update(), |= operator, and unpickling paths were not patched, allowing control characters to bypass input validation. Additionally, BaseCookie.js_output() lacked the output validation applied to BaseCookie.output(). Scope: local bookworm: open
debian
CVE-2026-0865MEDIUMCVSS 5.9fixed in python3.13 3.13.12-1 (forky)2026
CVE-2026-0865 [MEDIUM] CVE-2026-0865: jython - User-controlled header names and values containing newlines can allow injecting ... User-controlled header names and values containing newlines can allow injecting HTTP headers. Scope: local bookworm: open bullseye: open forky: open sid: open trixie: open
debian
CVE-2026-4224MEDIUMCVSS 6.0fixed in python3.14 3.14.3-4 (sid)2026
CVE-2026-4224 [MEDIUM] CVE-2026-4224: pypy3 - When an Expat parser with a registered ElementDeclHandler parses an inline docum... When an Expat parser with a registered ElementDeclHandler parses an inline document type definition containing a deeply nested content model a C stack overflow occurs. Scope: local bookworm: open bullseye: open forky: open sid: open trixie: open
debian
CVE-2026-3479LOW2026
CVE-2026-3479 [NONE] CVE-2026-3479: pypy3 - DISPUTED: The project has clarified that the documentation was incorrect, and th... DISPUTED: The project has clarified that the documentation was incorrect, and that pkgutil.get_data() has the same security model as open(). The documentation has been updated to clarify this point. There is no vulnerability in the function if following the intended security model. pkgutil.get_data() did not validate the resource argument as documented, allowing path tr
debian
CVE-2025-69534HIGHCVSS 7.5fixed in python3.13 3.13.4-1 (forky)2025
CVE-2025-69534 [HIGH] CVE-2025-69534: pypy3 - Python-Markdown version 3.8 contain a vulnerability where malformed HTML-like se... Python-Markdown version 3.8 contain a vulnerability where malformed HTML-like sequences can cause html.parser.HTMLParser to raise an unhandled AssertionError during Markdown parsing. Because Python-Markdown does not catch this exception, any application that processes attacker-controlled Markdown may crash. This enables remote, unauthenticated Denial of Service in web
debian
CVE-2025-8194HIGHCVSS 7.5fixed in python3.13 3.13.6-1 (forky)2025
CVE-2025-8194 [HIGH] CVE-2025-8194: pypy3 - There is a defect in the CPython “tarfile” module affecting the “TarFile” extrac... There is a defect in the CPython “tarfile” module affecting the “TarFile” extraction and entry enumeration APIs. The tar implementation would process tar archives with negative offsets without error, resulting in an infinite loop and deadlock during the parsing of maliciously crafted tar archives. This vulnerability can be mitigated by including the following patch afte
debian
CVE-2025-15366MEDIUMCVSS 5.9fixed in python3.9 3.9.2-1+deb11u5 (bullseye)2025
CVE-2025-15366 [MEDIUM] CVE-2025-15366: jython - The imaplib module, when passed a user-controlled command, can have additional c... The imaplib module, when passed a user-controlled command, can have additional commands injected using newlines. Mitigation rejects commands containing control characters. Scope: local bookworm: open bullseye: open forky: open sid: open trixie: open
debian
CVE-2025-12084MEDIUMCVSS 6.3fixed in python3.13 3.13.11-1 (forky)2025
CVE-2025-12084 [MEDIUM] CVE-2025-12084: jython - When building nested elements using xml.dom.minidom methods such as appendChild(... When building nested elements using xml.dom.minidom methods such as appendChild() that have a dependency on _clear_id_cache() the algorithm is quadratic. Availability can be impacted when building excessively nested documents. Scope: local bookworm: open bullseye: open forky: open sid: open trixie: open
debian
CVE-2025-0938MEDIUMCVSS 6.3fixed in pypy3 7.3.5+dfsg-2+deb11u5 (bullseye)2025
CVE-2025-0938 [MEDIUM] CVE-2025-0938: pypy3 - The Python standard library functions `urllib.parse.urlsplit` and `urlparse` acc... The Python standard library functions `urllib.parse.urlsplit` and `urlparse` accepted domain names that included square brackets which isn't valid according to RFC 3986. Square brackets are only meant to be used as delimiters for specifying IPv6 and IPvFuture hosts in URLs. This could result in differential parsing across the Python URL parser and other specification-
debian
CVE-2025-6069MEDIUMCVSS 4.3fixed in pypy3 7.3.5+dfsg-2+deb11u5 (bullseye)2025
CVE-2025-6069 [MEDIUM] CVE-2025-6069: jython - The html.parser.HTMLParser class had worse-case quadratic complexity when proces... The html.parser.HTMLParser class had worse-case quadratic complexity when processing certain crafted malformed inputs potentially leading to amplified denial-of-service. Scope: local bookworm: open bullseye: open forky: open sid: open trixie: open
debian
CVE-2025-15282MEDIUMCVSS 6.0fixed in python3.13 3.13.12-1 (forky)2025
CVE-2025-15282 [MEDIUM] CVE-2025-15282: pypy3 - User-controlled data URLs parsed by urllib.request.DataHandler allow injecting h... User-controlled data URLs parsed by urllib.request.DataHandler allow injecting headers through newlines in the data URL mediatype. Scope: local bookworm: open bullseye: open forky: open sid: open trixie: open
debian
CVE-2025-13836MEDIUMCVSS 6.3fixed in python3.13 3.13.11-1 (forky)2025
CVE-2025-13836 [MEDIUM] CVE-2025-13836: pypy3 - When reading an HTTP response from a server, if no read amount is specified, the... When reading an HTTP response from a server, if no read amount is specified, the default behavior will be to use Content-Length. This allows a malicious server to cause the client to read large amounts of data into memory, potentially causing OOM or other DoS. Scope: local bookworm: open bullseye: resolved forky: open sid: open trixie: open
debian
CVE-2025-12781MEDIUMCVSS 6.32025
CVE-2025-12781 [MEDIUM] CVE-2025-12781: pypy3 - When passing data to the b64decode(), standard_b64decode(), and urlsafe_b64decod... When passing data to the b64decode(), standard_b64decode(), and urlsafe_b64decode() functions in the "base64" module the characters "+/" will always be accepted, regardless of the value of "altchars" parameter, typically used to establish an "alternative base64 alphabet" such as the URL safe alphabet. This behavior matches what is recommended in earlier base64 RFCs,
debian
CVE-2025-15367MEDIUMCVSS 5.9fixed in python3.9 3.9.2-1+deb11u5 (bullseye)2025
CVE-2025-15367 [MEDIUM] CVE-2025-15367: jython - The poplib module, when passed a user-controlled command, can have additional co... The poplib module, when passed a user-controlled command, can have additional commands injected using newlines. Mitigation rejects commands containing control characters. Scope: local bookworm: open bullseye: open forky: open sid: open trixie: open
debian
CVE-2025-8291MEDIUMCVSS 4.3fixed in pypy3 7.3.5+dfsg-2+deb11u5 (bullseye)2025
CVE-2025-8291 [MEDIUM] CVE-2025-8291: jython - The 'zipfile' module would not check the validity of the ZIP64 End of Central Di... The 'zipfile' module would not check the validity of the ZIP64 End of Central Directory (EOCD) Locator record offset value would not be used to locate the ZIP64 EOCD record, instead the ZIP64 EOCD record would be assumed to be the previous record in the ZIP archive. This could be abused to create ZIP archives that are handled differently by the 'zipfile' module compa
debian
CVE-2025-11468LOWCVSS 5.7fixed in python3.13 3.13.12-1 (forky)2025
CVE-2025-11468 [MEDIUM] CVE-2025-11468: jython - When folding a long comment in an email header containing exclusively unfoldable... When folding a long comment in an email header containing exclusively unfoldable characters, the parenthesis would not be preserved. This could be used for injecting headers into email messages where addresses are user-controlled and not sanitized. Scope: local bookworm: resolved bullseye: resolved forky: resolved sid: resolved trixie: resolved
debian
Debian Python3.9 vulnerabilities | cvebase