Nixpkgs Security Tracker

Login with GitHub

Suggestions search

With package: haskellPackages.cpython

Found 15 matching suggestions

View:
Compact
Detailed
Untriaged
created 1 day, 22 hours ago
webbrowser.open() allows leading dashes in URLs

The webbrowser.open() API would accept leading dashes in the URL which could be handled as command line options for certain web browsers. New behavior rejects leading dashes. Users are recommended to sanitize URLs prior to passing to webbrowser.open().

Affected products

CPython
  • <3.15.0

Matching in nixpkgs

Package maintainers

Untriaged
created 3 days, 22 hours ago
pkgutil.get_data() does not enforce documented restrictions

pkgutil.get_data() did not validate the resource argument as documented, allowing path traversals.

Affected products

CPython
  • <3.15.0

Matching in nixpkgs

Package maintainers

Untriaged
created 5 days, 22 hours ago
Stack overflow parsing XML with deeply nested DTD content models

When an Expat parser with a registered ElementDeclHandler parses an inline document type definition containing a deeply nested content model a C stack overflow occurs.

Affected products

CPython
  • <3.15.0

Matching in nixpkgs

Package maintainers

Untriaged
created 5 days, 22 hours ago
Incomplete control character validation in http.cookies

The fix for CVE-2026-0672, which rejected control characters in http.cookies.Morsel, was incomplete. The Morsel.update(), |= operator, and unpickling paths were not patched, allowing control characters to bypass input validation. Additionally, BaseCookie.js_output() lacked the output validation applied to BaseCookie.output().

Affected products

CPython
  • <3.15.0

Matching in nixpkgs

Package maintainers

Untriaged
created 1 week, 2 days ago
tarfile: Skip DIRTYPE normalization during GNU LONGNAME/LONGLINK handling

The "tarfile" module would still apply normalization of AREGTYPE (\x00) blocks to DIRTYPE, even while processing a multi-block member such as GNUTYPE_LONGNAME or GNUTYPE_LONGLINK. This could result in a crafted tar archive being misinterpreted by the tarfile module compared to other implementations.

Affected products

CPython
  • <3.15.0

Matching in nixpkgs

Package maintainers

Untriaged
created 1 month, 3 weeks ago
Quadratic complexity in node ID cache clearing

When building nested elements using xml.dom.minidom methods such as appendChild() that have a dependency on _clear_id_cache() the algorithm is quadratic. Availability can be impacted when building excessively nested documents.

References

Affected products

CPython
  • <3.14.2
  • <3.13.11
  • <3.15.0a3
  • <3.15.0

Matching in nixpkgs

Package maintainers

Untriaged
created 1 month, 3 weeks ago
Excessive read buffering DoS in http.client

When reading an HTTP response from a server, if no read amount is specified, the default behavior will be to use Content-Length. This allows a malicious server to cause the client to read large amounts of data into memory, potentially causing OOM or other DoS.

References

Affected products

CPython
  • <3.13.11
  • <3.14.1
  • <3.15.0a3
  • <3.15.0

Matching in nixpkgs

Package maintainers

Untriaged
created 1 month, 3 weeks ago
email BytesGenerator header injection due to unquoted newlines

The email module, specifically the "BytesGenerator" class, didn’t properly quote newlines for email headers when serializing an email message allowing for header injection when an email is serialized. This is only applicable if using "LiteralHeader" writing headers that don't respect email folding rules, the new behavior will reject the incorrectly folded headers in "BytesGenerator".

References

Affected products

CPython
  • <3.13.12
  • <3.14.3
  • <3.15.0a6
  • <3.15.0

Matching in nixpkgs

Package maintainers

Untriaged
created 2 months ago
base64.b64decode() always accepts "+/" characters, despite setting altchars

When passing data to the b64decode(), standard_b64decode(), and urlsafe_b64decode() functions in the "base64" module the characters "+/" will always be accepted, regardless of the value of "altchars" parameter, typically used to establish an "alternative base64 alphabet" such as the URL safe alphabet. This behavior matches what is recommended in earlier base64 RFCs, but newer RFCs now recommend either dropping characters outside the specified base64 alphabet or raising an error. The old behavior has the possibility of causing data integrity issues. This behavior can only be insecure if your application uses an alternate base64 alphabet (without "+/"). If your application does not use the "altchars" parameter or the urlsafe_b64decode() function, then your application does not use an alternative base64 alphabet. The attached patches DOES NOT make the base64-decode behavior raise an error, as this would be a change in behavior and break existing programs. Instead, the patch deprecates the behavior which will be replaced with the newly recommended behavior in a future version of Python. Users are recommended to mitigate by verifying user-controlled inputs match the base64 alphabet they are expecting or verify that their application would not be affected if the b64decode() functions accepted "+" or "/" outside of altchars.

Affected products

CPython
  • <3.15.0a2
  • <3.13.10
  • <3.14.1
  • <3.15.0

Matching in nixpkgs

Package maintainers

Untriaged
created 2 months ago
Folding email comments of unfoldable characters doesn't preserve parenthesis

When folding a long comment in an email header containing exclusively unfoldable characters, the parenthesis would not be preserved. This could be used for injecting headers into email messages where addresses are user-controlled and not sanitized.

References

Affected products

CPython
  • <3.13.12
  • <3.14.3
  • <3.15.0a6
  • <3.15.0

Matching in nixpkgs

Package maintainers