vulnerability
Rocky Linux: CVE-2024-8088: python3.11 (Multiple Advisories)
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
5 | (AV:N/AC:H/Au:N/C:N/I:N/A:C) | Aug 22, 2024 | Oct 2, 2024 | May 8, 2025 |
Severity
5
CVSS
(AV:N/AC:H/Au:N/C:N/I:N/A:C)
Published
Aug 22, 2024
Added
Oct 2, 2024
Modified
May 8, 2025
Description
There is a HIGH severity vulnerability affecting the CPython "zipfile"
module affecting "zipfile.Path". Note that the more common API "zipfile.ZipFile" class is unaffected.
When iterating over names of entries in a zip archive (for example, methods
of "zipfile.Path" like "namelist()", "iterdir()", etc)
the process can be put into an infinite loop with a maliciously crafted
zip archive. This defect applies when reading only metadata or extracting
the contents of the zip archive. Programs that are not handling
user-controlled zip archives are not affected.
Solution(s)
rocky-upgrade-cython-debugsourcerocky-upgrade-numpy-debugsourcerocky-upgrade-python-cffi-debugsourcerocky-upgrade-python-cryptography-debugsourcerocky-upgrade-python-lxml-debugsourcerocky-upgrade-python-psutil-debugsourcerocky-upgrade-python-psycopg2-debugsourcerocky-upgrade-python3.11rocky-upgrade-python3.11-debugrocky-upgrade-python3.11-debuginforocky-upgrade-python3.11-debugsourcerocky-upgrade-python3.11-develrocky-upgrade-python3.11-idlerocky-upgrade-python3.11-libsrocky-upgrade-python3.11-testrocky-upgrade-python3.11-tkinterrocky-upgrade-python3.12rocky-upgrade-python3.12-debugrocky-upgrade-python3.12-debuginforocky-upgrade-python3.12-debugsourcerocky-upgrade-python3.12-develrocky-upgrade-python3.12-idlerocky-upgrade-python3.12-libsrocky-upgrade-python3.12-testrocky-upgrade-python3.12-tkinterrocky-upgrade-python39rocky-upgrade-python39-cffirocky-upgrade-python39-cffi-debuginforocky-upgrade-python39-cryptographyrocky-upgrade-python39-cryptography-debuginforocky-upgrade-python39-cythonrocky-upgrade-python39-cython-debuginforocky-upgrade-python39-debugrocky-upgrade-python39-debuginforocky-upgrade-python39-debugsourcerocky-upgrade-python39-develrocky-upgrade-python39-idlerocky-upgrade-python39-libsrocky-upgrade-python39-lxmlrocky-upgrade-python39-lxml-debuginforocky-upgrade-python39-mod_wsgirocky-upgrade-python39-numpyrocky-upgrade-python39-numpy-debuginforocky-upgrade-python39-numpy-f2pyrocky-upgrade-python39-psutilrocky-upgrade-python39-psutil-debuginforocky-upgrade-python39-psycopg2rocky-upgrade-python39-psycopg2-debuginforocky-upgrade-python39-psycopg2-docrocky-upgrade-python39-psycopg2-testsrocky-upgrade-python39-pybind11rocky-upgrade-python39-pybind11-develrocky-upgrade-python39-pyyamlrocky-upgrade-python39-pyyaml-debuginforocky-upgrade-python39-scipyrocky-upgrade-python39-scipy-debuginforocky-upgrade-python39-testrocky-upgrade-python39-tkinterrocky-upgrade-pyyaml-debugsourcerocky-upgrade-scipy-debugsource
References

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.