Debian Python3.9 vulnerabilities
75 known vulnerabilities affecting debian/python3.9.
Total CVEs
75
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
CRITICAL6HIGH19MEDIUM27LOW23
Vulnerabilities
Page 4 of 4
CVE-2022-26488LOWCVSS 7.02022
CVE-2022-26488 [HIGH] CVE-2022-26488: python2.7 - In Python before 3.10.3 on Windows, local users can gain privileges because the ...
In Python before 3.10.3 on Windows, local users can gain privileges because the search path is inadequately secured. The installer may allow a local attacker to add user-writable directories to the system search path. To exploit, an administrator must have installed Python for all users and enabled PATH entries. A non-administrative user can trigger a repair that
debian
CVE-2021-29921CRITICALCVSS 9.8fixed in pypy3 7.3.8+dfsg-1 (bookworm)2021
CVE-2021-29921 [CRITICAL] CVE-2021-29921: pypy3 - In Python before 3,9,5, the ipaddress library mishandles leading zero characters...
In Python before 3,9,5, the ipaddress library mishandles leading zero characters in the octets of an IP address string. This (in some situations) allows attackers to bypass access control that is based on IP addresses.
Scope: local
bookworm: resolved (fixed in 7.3.8+dfsg-1)
bullseye: resolved
forky: resolved (fixed in 7.3.8+dfsg-1)
sid: resolved (fixed in 7.3.8+df
debian
CVE-2021-3177CRITICALCVSS 9.8fixed in python2.7 2.7.18-2 (bullseye)2021
CVE-2021-3177 [CRITICAL] CVE-2021-3177: python2.7 - Python 3.x through 3.9.1 has a buffer overflow in PyCArg_repr in _ctypes/callpro...
Python 3.x through 3.9.1 has a buffer overflow in PyCArg_repr in _ctypes/callproc.c, which may lead to remote code execution in certain Python applications that accept floating-point numbers as untrusted input, as demonstrated by a 1e300 argument to c_double.from_param. This occurs because sprintf is used unsafely.
Scope: local
bullseye: resolved (fixed in 2.7.1
debian
CVE-2021-3737HIGHCVSS 7.5fixed in pypy3 7.3.8+dfsg-1 (bookworm)2021
CVE-2021-3737 [HIGH] CVE-2021-3737: pypy3 - A flaw was found in python. An improperly handled HTTP response in the HTTP clie...
A flaw was found in python. An improperly handled HTTP response in the HTTP client code of python may allow a remote attacker, who controls the HTTP server, to make the client script enter an infinite loop, consuming CPU time. The highest threat from this vulnerability is to system availability.
Scope: local
bookworm: resolved (fixed in 7.3.8+dfsg-1)
bullseye: resolved
debian
CVE-2021-3733MEDIUMCVSS 6.5fixed in pypy3 7.3.5+dfsg-2 (bookworm)2021
CVE-2021-3733 [MEDIUM] CVE-2021-3733: pypy3 - There's a flaw in urllib's AbstractBasicAuthHandler class. An attacker who contr...
There's a flaw in urllib's AbstractBasicAuthHandler class. An attacker who controls a malicious HTTP server that an HTTP client (such as web browser) connects to, could trigger a Regular Expression Denial of Service (ReDOS) during an authentication request with a specially crafted payload that is sent by the server to the client. The greatest threat that this flaw pos
debian
CVE-2021-4189MEDIUMCVSS 5.3fixed in pypy3 7.3.5+dfsg-2 (bookworm)2021
CVE-2021-4189 [MEDIUM] CVE-2021-4189: pypy3 - A flaw was found in Python, specifically in the FTP (File Transfer Protocol) cli...
A flaw was found in Python, specifically in the FTP (File Transfer Protocol) client library in PASV (passive) mode. The issue is how the FTP client trusts the host from the PASV response by default. This flaw allows an attacker to set up a malicious FTP server that can trick FTP clients into connecting back to a given IP address and port. This vulnerability could lead
debian
CVE-2021-23336MEDIUMCVSS 5.9fixed in pypy3 7.3.3+dfsg-3 (bookworm)2021
CVE-2021-23336 [MEDIUM] CVE-2021-23336: pypy3 - The package python/cpython from 0 and before 3.6.13, from 3.7.0 and before 3.7.1...
The package python/cpython from 0 and before 3.6.13, from 3.7.0 and before 3.7.10, from 3.8.0 and before 3.8.8, from 3.9.0 and before 3.9.2 are vulnerable to Web Cache Poisoning via urllib.parse.parse_qsl and urllib.parse.parse_qs by using a vector called parameter cloaking. When the attacker can separate query parameters using a semicolon (;), they can cause a diff
debian
CVE-2021-3426MEDIUMCVSS 5.7fixed in pypy3 7.3.3+dfsg-4 (bookworm)2021
CVE-2021-3426 [MEDIUM] CVE-2021-3426: pypy3 - There's a flaw in Python 3's pydoc. A local or adjacent attacker who discovers o...
There's a flaw in Python 3's pydoc. A local or adjacent attacker who discovers or is able to convince another local or adjacent user to start a pydoc server could access the server and use it to disclose sensitive information belonging to the other user that they would not normally be able to access. The highest risk of this flaw is to data confidentiality. This flaw
debian
CVE-2021-28861LOWCVSS 7.4fixed in pypy3 7.3.10+dfsg-1 (bookworm)2021
CVE-2021-28861 [HIGH] CVE-2021-28861: pypy3 - Python 3.x through 3.10 has an open redirection vulnerability in lib/http/server...
Python 3.x through 3.10 has an open redirection vulnerability in lib/http/server.py due to no protection against multiple (/) at the beginning of URI path which may leads to information disclosure. NOTE: this is disputed by a third party because the http.server.html documentation page states "Warning: http.server is not recommended for production. It only implements b
debian
CVE-2020-27619CRITICALCVSS 9.8fixed in pypy3 7.3.5+dfsg-2 (bookworm)2020
CVE-2020-27619 [CRITICAL] CVE-2020-27619: pypy3 - In Python 3 through 3.9.0, the Lib/test/multibytecodec_support.py CJK codec test...
In Python 3 through 3.9.0, the Lib/test/multibytecodec_support.py CJK codec tests call eval() on content retrieved via HTTP.
Scope: local
bookworm: resolved (fixed in 7.3.5+dfsg-2)
bullseye: resolved (fixed in 7.3.5+dfsg-2)
forky: resolved (fixed in 7.3.5+dfsg-2)
sid: resolved (fixed in 7.3.5+dfsg-2)
trixie: resolved (fixed in 7.3.5+dfsg-2)
debian
CVE-2020-26116HIGHCVSS 7.2fixed in pypy3 7.3.3+dfsg-1 (bookworm)2020
CVE-2020-26116 [HIGH] CVE-2020-26116: pypy3 - http.client in Python 3.x before 3.5.10, 3.6.x before 3.6.12, 3.7.x before 3.7.9...
http.client in Python 3.x before 3.5.10, 3.6.x before 3.6.12, 3.7.x before 3.7.9, and 3.8.x before 3.8.5 allows CRLF injection if the attacker controls the HTTP request method, as demonstrated by inserting CR and LF control characters in the first argument of HTTPConnection.request.
Scope: local
bookworm: resolved (fixed in 7.3.3+dfsg-1)
bullseye: resolved (fixed in 7
debian
CVE-2020-10735HIGHCVSS 7.5fixed in pypy3 7.3.10+dfsg-1 (bookworm)2020
CVE-2020-10735 [HIGH] CVE-2020-10735: pypy3 - A flaw was found in python. In algorithms with quadratic time complexity using n...
A flaw was found in python. In algorithms with quadratic time complexity using non-binary bases, when using int("text"), a system could take 50ms to parse an int string with 100,000 digits and 5s for 1,000,000 digits (float, decimal, int.from_bytes(), and int() for binary bases 2, 4, 8, 16, and 32 are not affected). The highest threat from this vulnerability is to sys
debian
CVE-2020-15801LOWCVSS 9.82020
CVE-2020-15801 [CRITICAL] CVE-2020-15801: python2.7 - In Python 3.8.4, sys.path restrictions specified in a python38._pth file are ign...
In Python 3.8.4, sys.path restrictions specified in a python38._pth file are ignored, allowing code to be loaded from arbitrary locations. The ._pth file (e.g., the python._pth file) is not affected.
Scope: local
bullseye: resolved
debian
CVE-2019-20907HIGHCVSS 7.5fixed in pypy3 7.3.3+dfsg-1 (bookworm)2019
CVE-2019-20907 [HIGH] CVE-2019-20907: pypy3 - In Lib/tarfile.py in Python through 3.8.3, an attacker is able to craft a TAR ar...
In Lib/tarfile.py in Python through 3.8.3, an attacker is able to craft a TAR archive leading to an infinite loop when opened by tarfile.open, because _proc_pax lacks header validation.
Scope: local
bookworm: resolved (fixed in 7.3.3+dfsg-1)
bullseye: resolved (fixed in 7.3.3+dfsg-1)
forky: resolved (fixed in 7.3.3+dfsg-1)
sid: resolved (fixed in 7.3.3+dfsg-1)
trixie:
debian
CVE-2015-20107HIGHCVSS 7.6fixed in pypy3 7.3.11+dfsg-1 (bookworm)2015
CVE-2015-20107 [HIGH] CVE-2015-20107: pypy3 - In Python (aka CPython) up to 3.10.8, the mailcap module does not add escape cha...
In Python (aka CPython) up to 3.10.8, the mailcap module does not add escape characters into commands discovered in the system mailcap file. This may allow attackers to inject shell commands into applications that call mailcap.findmatch with untrusted input (if they lack validation of user-provided filenames or arguments). The fix is also back-ported to 3.7, 3.8, 3.9
debian
← Previous4 / 4