• 公告ID (KylinSec-SA-2025-2712)

摘要:

python3 security update

安全等级: Critical

公告ID: KylinSec-SA-2025-2712

发布日期: 2025年8月26日

关联CVE: CVE-2025-4435   CVE-2025-4330   CVE-2025-4138   CVE-2025-4517   CVE-2024-12718  

  • 详细介绍

1. 漏洞描述

   

Python combines remarkable power with very clear syntax. It has modules, classes, exceptions, very high level dynamic data types, and dynamic typing. There are interfaces to many system calls and libraries, as well as to various windowing systems. New built-in modules are easily written in C or C++ (or other languages, depending on the chosen implementation). Python is also usable as an extension language for applications written in other languages that need easy-to-use scripting or automation interfaces.

Security Fix(es):

Python is an open source, object-oriented programming language from the Python Foundation. This language has the characteristics of scalability, supporting modules and packages, and supporting multiple platforms.
There is a security vulnerability in Python 3.12 and later versions. This vulnerability originates from the tarfile module extraction filter function that allows modifying file metadata and permissions outside the extract directory.(CVE-2024-12718)

A vulnerability classified as critical was found in Python CPython up to 3.14.0b1 (Programming Language Software).The CWE definition for the vulnerability is CWE-22. The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.As an impact it is known to affect confidentiality.Upgrading to version 3.14.0b2 eliminates this vulnerability. Applying a patch is able to eliminate this problem. The bugfix is ready for download at github.com. The best possible mitigation is suggested to be upgrading to the latest version.(CVE-2025-4138)

A vulnerability, which was classified as critical, has been found in Python CPython up to 3.14.0b1 (Programming Language Software).Using CWE to declare the problem leads to CWE-22. The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.Impacted is integrity, and availability.Upgrading to version 3.14.0b2 eliminates this vulnerability. Applying a patch is able to eliminate this problem. The bugfix is ready for download at github.com. The best possible mitigation is suggested to be upgrading to the latest version.(CVE-2025-4330)

A vulnerability has been found in Python CPython up to 3.14.0b1 (Programming Language Software) and classified as problematic.As an impact it is known to affect integrity.Upgrading to version 3.14.0b2 eliminates this vulnerability. Applying a patch is able to eliminate this problem. The bugfix is ready for download at github.com. The best possible mitigation is suggested to be upgrading to the latest version.(CVE-2025-4435)

A vulnerability, which was classified as critical, was found in Python CPython up to 3.14.0b1 (Programming Language Software).CWE is classifying the issue as CWE-22. The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.This is going to have an impact on confidentiality, integrity, and availability.Upgrading to version 3.14.0b2 eliminates this vulnerability. Applying a patch is able to eliminate this problem. The bugfix is ready for download at github.com. The best possible mitigation is suggested to be upgrading to the latest version.(CVE-2025-4517)

2. 影响范围

cve名称 产品 组件 是否受影响
CVE-2025-4435 V6 python3 Fixed
CVE-2025-4330 V6 python3 Fixed
CVE-2025-4138 V6 python3 Fixed
CVE-2025-4517 V6 python3 Fixed
CVE-2024-12718 V6 python3 Fixed

3. 影响组件

    python3

4. 修复版本

   

V6

软件名称 架构 版本号
python3-help noarch 3.11.6-11.ks6
python3 x86_64 3.11.6-11.ks6
python3-devel x86_64 3.11.6-11.ks6
python3-tkinter x86_64 3.11.6-11.ks6
python3-unversioned-command x86_64 3.11.6-11.ks6
python3 aarch64 3.11.6-11.ks6
python3-devel aarch64 3.11.6-11.ks6
python3-tkinter aarch64 3.11.6-11.ks6
python3-unversioned-command aarch64 3.11.6-11.ks6

5. 修复方法


方法一:下载安装包进行升级安装
1、通过下载链接下载需要升级的升级包保存,如 xxx.rpm
2、通过rpm命令升级,如 rpm -Uvh xxx.rpm

方法二:通过软件源进行升级安装
1、保持能够连接上互联网
2、通过yum命令升级指定的包,如 yum install 包名

6. 下载链接

   

V6:

x86_64:

     python3-help   

     python3   

     python3-devel   

     python3-tkinter   

     python3-unversioned-command   

aarch64:

     python3-help   

     python3   

     python3-devel   

     python3-tkinter   

     python3-unversioned-command   

上一篇:KylinSec-SA-2025-2709 下一篇:KylinSec-SA-2025-2725