Overview
About vulnerability
There is a HIGH severity vulnerability affecting the CPython “zipfile” module affecting “zipfile.Path”. Note that the more common API “zipfile.ZipFile” class is unaffected.
When iterating over names of entries in a zip archive (for example, methods of “zipfile.Path” like “namelist()”, “iterdir()”, etc) the process can be put into an infinite loop with a maliciously crafted zip archive. This defect applies when reading only metadata or extracting the contents of the zip archive. Programs that are not handling user-controlled zip archives are not affected.
Details
- Affected product:
- AlmaLinux 9.2 ESU , CentOS 6 ELS , CentOS 7 ELS , CentOS 8.4 ELS , CentOS 8.5 ELS , CentOS Stream 8 ELS , CloudLinux 6 ELS , CloudLinux 7 ELS , Oracle Linux 6 ELS
- Affected packages:
- python2 @ 2.7.18 (+12 more)
There is a HIGH severity vulnerability affecting the CPython “zipfile” module affecting “zipfile.Path”. Note that the more common API “zipfile.ZipFile” class is unaffected.
When iterating over names of entries in a zip archive (for example, methods of “zipfile.Path” like “namelist()”, “iterdir()”, etc) the process can be put into an infinite loop with a maliciously crafted zip archive. This defect applies when reading only metadata or extracting the contents of the zip archive. Programs that are not handling user-controlled zip archives are not affected.