There is a HIGH severity vulnerability affecting the CPython "zipfile" module affecting "zipfile.Path". Note that the more common API "zipfile.ZipFile" class is unaffected. When iterating over names of entries in a zip archive (for example, methods of "zipfile.Path" like "namelist()", "iterdir()", etc) the process can be put into an infinite loop with a maliciously crafted zip archive. This defect applies when reading only metadata or extracting the contents of the zip archive. Programs that are not handling user-controlled zip archives are not affected.
References
Link Providers
http://www.openwall.com/lists/oss-security/2024/08/22/1 cve-icon
http://www.openwall.com/lists/oss-security/2024/08/22/4 cve-icon
http://www.openwall.com/lists/oss-security/2024/08/23/1 cve-icon
http://www.openwall.com/lists/oss-security/2024/08/23/2 cve-icon
https://github.com/python/cpython/commit/0aa1ee22ab6e204e9d3d0e9dd63ea648ed691ef1 cve-icon cve-icon
https://github.com/python/cpython/commit/2231286d78d328c2f575e0b05b16fe447d1656d6 cve-icon cve-icon
https://github.com/python/cpython/commit/795f2597a4be988e2bb19b69ff9958e981cb894e cve-icon cve-icon cve-icon
https://github.com/python/cpython/commit/7bc367e464ce50b956dd232c1dfa1cad4e7fb814 cve-icon cve-icon
https://github.com/python/cpython/commit/7e8883a3f04d308302361aeffc73e0e9837f19d4 cve-icon cve-icon
https://github.com/python/cpython/commit/8c7348939d8a3ecd79d630075f6be1b0c5b41f64 cve-icon cve-icon cve-icon
https://github.com/python/cpython/commit/95b073bddefa6243effa08e131e297c0383e7f6a cve-icon cve-icon
https://github.com/python/cpython/commit/962055268ed4f2ca1d717bfc8b6385de50a23ab7 cve-icon cve-icon
https://github.com/python/cpython/commit/dcc5182f27c1500006a1ef78e10613bb45788dea cve-icon cve-icon cve-icon
https://github.com/python/cpython/commit/e0264a61119d551658d9445af38323ba94fc16db cve-icon cve-icon
https://github.com/python/cpython/commit/fc0b8259e693caa8400fa8b6ac1e494e47ea7798 cve-icon cve-icon
https://github.com/python/cpython/issues/122905 cve-icon cve-icon cve-icon
https://github.com/python/cpython/issues/123270 cve-icon cve-icon
https://github.com/python/cpython/pull/122906 cve-icon cve-icon cve-icon
https://mail.python.org/archives/list/[email protected]/thread/GNFCKVI4TCATKQLALJ5SN4L4CSPSMILU/ cve-icon cve-icon cve-icon
https://nvd.nist.gov/vuln/detail/CVE-2024-8088 cve-icon
https://security.netapp.com/advisory/ntap-20241011-0010/ cve-icon
https://www.cve.org/CVERecord?id=CVE-2024-8088 cve-icon
History

Fri, 22 Nov 2024 12:00:00 +0000


Wed, 13 Nov 2024 02:30:00 +0000

Type Values Removed Values Added
CPEs cpe:/a:redhat:enterprise_linux:9
cpe:/o:redhat:enterprise_linux:9

Fri, 11 Oct 2024 23:15:00 +0000

Type Values Removed Values Added
First Time appeared Python Software Foundation
Python Software Foundation cpython
CPEs cpe:2.3:a:python_software_foundation:cpython:*:*:*:*:*:*:*:*
Vendors & Products Python Software Foundation
Python Software Foundation cpython
References
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 04 Sep 2024 22:45:00 +0000


Wed, 04 Sep 2024 20:30:00 +0000


Tue, 03 Sep 2024 15:30:00 +0000


Thu, 29 Aug 2024 06:30:00 +0000

Type Values Removed Values Added
First Time appeared Redhat
Redhat enterprise Linux
CPEs cpe:/a:redhat:enterprise_linux:8
Vendors & Products Redhat
Redhat enterprise Linux

Wed, 28 Aug 2024 14:30:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}

cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H'}


Wed, 28 Aug 2024 14:15:00 +0000

Type Values Removed Values Added
References

Mon, 26 Aug 2024 18:45:00 +0000

Type Values Removed Values Added
Description There is a HIGH severity vulnerability affecting the CPython "zipfile" module. When iterating over names of entries in a zip archive (for example, methods of "zipfile.ZipFile" like "namelist()", "iterdir()", "extractall()", etc) the process can be put into an infinite loop with a maliciously crafted zip archive. This defect applies when reading only metadata or extracting the contents of the zip archive. Programs that are not handling user-controlled zip archives are not affected. There is a HIGH severity vulnerability affecting the CPython "zipfile" module affecting "zipfile.Path". Note that the more common API "zipfile.ZipFile" class is unaffected. When iterating over names of entries in a zip archive (for example, methods of "zipfile.Path" like "namelist()", "iterdir()", etc) the process can be put into an infinite loop with a maliciously crafted zip archive. This defect applies when reading only metadata or extracting the contents of the zip archive. Programs that are not handling user-controlled zip archives are not affected.
Title Infinite loop when iterating over zip archive entry names Infinite loop when iterating over zip archive entry names from zipfile.Path

Sat, 24 Aug 2024 00:30:00 +0000

Type Values Removed Values Added
References

Fri, 23 Aug 2024 19:30:00 +0000

Type Values Removed Values Added
References

Fri, 23 Aug 2024 18:30:00 +0000


Fri, 23 Aug 2024 18:15:00 +0000


Fri, 23 Aug 2024 01:15:00 +0000

Type Values Removed Values Added
References
Metrics threat_severity

None

threat_severity

Moderate


Thu, 22 Aug 2024 19:00:00 +0000

Type Values Removed Values Added
Description There is a HIGH severity vulnerability affecting the CPython "zipfile" module. When iterating over names of entries in a zip archive (for example, methods of "zipfile.ZipFile" like "namelist()", "iterdir()", "extractall()", etc) the process can be put into an infinite loop with a maliciously crafted zip archive. This defect applies when reading only metadata or extracting the contents of the zip archive. Programs that are not handling user-controlled zip archives are not affected.
Title Infinite loop when iterating over zip archive entry names
Weaknesses CWE-835
References
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/S:N/AU:N/R:U/RE:L'}


cve-icon MITRE

Status: PUBLISHED

Assigner: PSF

Published: 2024-08-22T18:45:31.807Z

Updated: 2024-10-11T22:03:20.370Z

Reserved: 2024-08-22T12:42:32.661Z

Link: CVE-2024-8088

cve-icon Vulnrichment

Updated: 2024-10-11T22:03:20.370Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-08-22T19:15:09.720

Modified: 2024-11-21T09:52:39.210

Link: CVE-2024-8088

cve-icon Redhat

Severity : Moderate

Publid Date: 2024-08-22T19:15:09Z

Links: CVE-2024-8088 - Bugzilla