Skip to content

Commit 92ba007

Browse files
author
github-actions
committed
Assign IDs
1 parent a6f31b7 commit 92ba007

File tree

6 files changed

+26
-26
lines changed

6 files changed

+26
-26
lines changed

advisories/.id-allocator

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1 +1 @@
1-
a1a222b327af5612997b49e482503ce60f9a7cde94f4fa5737d3881fa3ea71e1
1+
6d73e534133379103eb0a0b74fe16670e5adbae38b9f429a61de6a4d8021cf05

advisories/python/PSF-0000-CVE-2024-12718.json renamed to advisories/python/PSF-2025-5.json

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,12 +1,12 @@
11
{
2+
"modified": "2025-06-03T20:55:06Z",
3+
"published": "2025-06-03T12:59:10Z",
24
"schema_version": "1.5.0",
3-
"id": "PSF-0000-CVE-2024-12718",
5+
"id": "PSF-2025-5",
46
"aliases": [
57
"CVE-2024-12718"
68
],
7-
"published": "2025-06-03T12:59:10.908Z",
8-
"modified": "2025-06-03T20:55:06.702Z",
9-
"details": "Allows modifying some file metadata (e.g. last modified) with filter=\"data\"\u00a0or file permissions (chmod) with filter=\"tar\"\u00a0of files outside the extraction directory.\nYou are affected by this vulnerability if using the tarfile\u00a0module to extract untrusted tar archives using TarFile.extractall()\u00a0or TarFile.extract()\u00a0using the filter=\u00a0parameter with a value of \"data\"\u00a0or \"tar\". See the tarfile extraction filters documentation https://docs.python.org/3/library/tarfile.html#tarfile-extraction-filter \u00a0for more information. Only Python versions 3.12 or later are affected by these vulnerabilities, earlier versions don't include the extraction filter feature.\n\nNote that for Python 3.14 or later the default value of filter=\u00a0changed from \"no filtering\" to `\"data\", so if you are relying on this new default behavior then your usage is also affected.\n\nNote that none of these vulnerabilities significantly affect the installation of source distributions which are tar archives as source distributions already allow arbitrary code execution during the build process. However when evaluating source distributions it's important to avoid installing source distributions with suspicious links.",
9+
"details": "Allows modifying some file metadata (e.g. last modified) with filter=\"data\" or file permissions (chmod) with filter=\"tar\" of files outside the extraction directory.\nYou are affected by this vulnerability if using the tarfile module to extract untrusted tar archives using TarFile.extractall() or TarFile.extract() using the filter= parameter with a value of \"data\" or \"tar\". See the tarfile extraction filters documentation https://docs.python.org/3/library/tarfile.html#tarfile-extraction-filter  for more information. Only Python versions 3.12 or later are affected by these vulnerabilities, earlier versions don't include the extraction filter feature.\n\nNote that for Python 3.14 or later the default value of filter= changed from \"no filtering\" to `\"data\", so if you are relying on this new default behavior then your usage is also affected.\n\nNote that none of these vulnerabilities significantly affect the installation of source distributions which are tar archives as source distributions already allow arbitrary code execution during the build process. However when evaluating source distributions it's important to avoid installing source distributions with suspicious links.",
1010
"affected": [
1111
{
1212
"ranges": [
@@ -103,4 +103,4 @@
103103
"database_specific": {
104104
"cwe_ids": []
105105
}
106-
}
106+
}

advisories/python/PSF-0000-CVE-2025-4138.json renamed to advisories/python/PSF-2025-6.json

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,12 +1,12 @@
11
{
2+
"modified": "2025-06-03T20:53:14Z",
3+
"published": "2025-06-03T12:59:02Z",
24
"schema_version": "1.5.0",
3-
"id": "PSF-0000-CVE-2025-4138",
5+
"id": "PSF-2025-6",
46
"aliases": [
57
"CVE-2025-4138"
68
],
7-
"published": "2025-06-03T12:59:02.717Z",
8-
"modified": "2025-06-03T20:53:14.850Z",
9-
"details": "Allows the extraction filter to be ignored, allowing symlink targets to point outside the destination directory, and the modification of some file metadata.\n\n\nYou are affected by this vulnerability if using the tarfile\u00a0module to extract untrusted tar archives using TarFile.extractall()\u00a0or TarFile.extract()\u00a0using the filter=\u00a0parameter with a value of \"data\"\u00a0or \"tar\". See the tarfile extraction filters documentation https://docs.python.org/3/library/tarfile.html#tarfile-extraction-filter \u00a0for more information. Only Python versions 3.12 or later are affected by these vulnerabilities, earlier versions don't include the extraction filter feature.\n\nNote that for Python 3.14 or later the default value of filter=\u00a0changed from \"no filtering\" to `\"data\", so if you are relying on this new default behavior then your usage is also affected.\n\nNote that none of these vulnerabilities significantly affect the installation of source distributions which are tar archives as source distributions already allow arbitrary code execution during the build process. However when evaluating source distributions it's important to avoid installing source distributions with suspicious links.",
9+
"details": "Allows the extraction filter to be ignored, allowing symlink targets to point outside the destination directory, and the modification of some file metadata.\n\n\nYou are affected by this vulnerability if using the tarfile module to extract untrusted tar archives using TarFile.extractall() or TarFile.extract() using the filter= parameter with a value of \"data\" or \"tar\". See the tarfile extraction filters documentation https://docs.python.org/3/library/tarfile.html#tarfile-extraction-filter  for more information. Only Python versions 3.12 or later are affected by these vulnerabilities, earlier versions don't include the extraction filter feature.\n\nNote that for Python 3.14 or later the default value of filter= changed from \"no filtering\" to `\"data\", so if you are relying on this new default behavior then your usage is also affected.\n\nNote that none of these vulnerabilities significantly affect the installation of source distributions which are tar archives as source distributions already allow arbitrary code execution during the build process. However when evaluating source distributions it's important to avoid installing source distributions with suspicious links.",
1010
"affected": [
1111
{
1212
"ranges": [
@@ -99,4 +99,4 @@
9999
"database_specific": {
100100
"cwe_ids": []
101101
}
102-
}
102+
}

advisories/python/PSF-0000-CVE-2025-4330.json renamed to advisories/python/PSF-2025-7.json

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,12 +1,12 @@
11
{
2+
"modified": "2025-06-03T20:53:21Z",
3+
"published": "2025-06-03T12:58:57Z",
24
"schema_version": "1.5.0",
3-
"id": "PSF-0000-CVE-2025-4330",
5+
"id": "PSF-2025-7",
46
"aliases": [
57
"CVE-2025-4330"
68
],
7-
"published": "2025-06-03T12:58:57.452Z",
8-
"modified": "2025-06-03T20:53:21.110Z",
9-
"details": "Allows the extraction filter to be ignored, allowing symlink targets to point outside the destination directory, and the modification of some file metadata.\n\n\nYou are affected by this vulnerability if using the tarfile\u00a0module to extract untrusted tar archives using TarFile.extractall()\u00a0or TarFile.extract()\u00a0using the filter=\u00a0parameter with a value of \"data\"\u00a0or \"tar\". See the tarfile extraction filters documentation https://docs.python.org/3/library/tarfile.html#tarfile-extraction-filter \u00a0for more information. Only Python versions 3.12 or later are affected by these vulnerabilities, earlier versions don't include the extraction filter feature.\n\nNote that for Python 3.14 or later the default value of filter=\u00a0changed from \"no filtering\" to `\"data\", so if you are relying on this new default behavior then your usage is also affected.\n\nNote that none of these vulnerabilities significantly affect the installation of source distributions which are tar archives as source distributions already allow arbitrary code execution during the build process. However when evaluating source distributions it's important to avoid installing source distributions with suspicious links.",
9+
"details": "Allows the extraction filter to be ignored, allowing symlink targets to point outside the destination directory, and the modification of some file metadata.\n\n\nYou are affected by this vulnerability if using the tarfile module to extract untrusted tar archives using TarFile.extractall() or TarFile.extract() using the filter= parameter with a value of \"data\" or \"tar\". See the tarfile extraction filters documentation https://docs.python.org/3/library/tarfile.html#tarfile-extraction-filter  for more information. Only Python versions 3.12 or later are affected by these vulnerabilities, earlier versions don't include the extraction filter feature.\n\nNote that for Python 3.14 or later the default value of filter= changed from \"no filtering\" to `\"data\", so if you are relying on this new default behavior then your usage is also affected.\n\nNote that none of these vulnerabilities significantly affect the installation of source distributions which are tar archives as source distributions already allow arbitrary code execution during the build process. However when evaluating source distributions it's important to avoid installing source distributions with suspicious links.",
1010
"affected": [
1111
{
1212
"ranges": [
@@ -99,4 +99,4 @@
9999
"database_specific": {
100100
"cwe_ids": []
101101
}
102-
}
102+
}

advisories/python/PSF-0000-CVE-2025-4435.json renamed to advisories/python/PSF-2025-8.json

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,12 +1,12 @@
11
{
2+
"modified": "2025-06-03T20:53:26Z",
3+
"published": "2025-06-03T12:59:06Z",
24
"schema_version": "1.5.0",
3-
"id": "PSF-0000-CVE-2025-4435",
5+
"id": "PSF-2025-8",
46
"aliases": [
57
"CVE-2025-4435"
68
],
7-
"published": "2025-06-03T12:59:06.792Z",
8-
"modified": "2025-06-03T20:53:26.955Z",
9-
"details": "When using a TarFile.errorlevel = 0\u00a0and extracting with a filter the documented behavior is that any filtered members would be skipped and not extracted. However the actual behavior of TarFile.errorlevel = 0\u00a0in affected versions is that the member would still be extracted and not skipped.",
9+
"details": "When using a TarFile.errorlevel = 0 and extracting with a filter the documented behavior is that any filtered members would be skipped and not extracted. However the actual behavior of TarFile.errorlevel = 0 in affected versions is that the member would still be extracted and not skipped.",
1010
"affected": [
1111
{
1212
"ranges": [
@@ -95,4 +95,4 @@
9595
"database_specific": {
9696
"cwe_ids": []
9797
}
98-
}
98+
}

advisories/python/PSF-0000-CVE-2025-4517.json renamed to advisories/python/PSF-2025-9.json

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,12 +1,12 @@
11
{
2+
"modified": "2025-06-03T20:53:39Z",
3+
"published": "2025-06-03T12:58:50Z",
24
"schema_version": "1.5.0",
3-
"id": "PSF-0000-CVE-2025-4517",
5+
"id": "PSF-2025-9",
46
"aliases": [
57
"CVE-2025-4517"
68
],
7-
"published": "2025-06-03T12:58:50.352Z",
8-
"modified": "2025-06-03T20:53:39.367Z",
9-
"details": "Allows arbitrary filesystem writes outside the extraction directory during extraction with filter=\"data\".\n\n\nYou are affected by this vulnerability if using the tarfile\u00a0module to extract untrusted tar archives using TarFile.extractall()\u00a0or TarFile.extract()\u00a0using the filter=\u00a0parameter with a value of \"data\"\u00a0or \"tar\". See the tarfile extraction filters documentation https://docs.python.org/3/library/tarfile.html#tarfile-extraction-filter \u00a0for more information. Only Python versions 3.12 or later are affected by these vulnerabilities, earlier versions don't include the extraction filter feature.\n\nNote that for Python 3.14 or later the default value of filter=\u00a0changed from \"no filtering\" to `\"data\", so if you are relying on this new default behavior then your usage is also affected.\n\nNote that none of these vulnerabilities significantly affect the installation of source distributions which are tar archives as source distributions already allow arbitrary code execution during the build process. However when evaluating source distributions it's important to avoid installing source distributions with suspicious links.",
9+
"details": "Allows arbitrary filesystem writes outside the extraction directory during extraction with filter=\"data\".\n\n\nYou are affected by this vulnerability if using the tarfile module to extract untrusted tar archives using TarFile.extractall() or TarFile.extract() using the filter= parameter with a value of \"data\" or \"tar\". See the tarfile extraction filters documentation https://docs.python.org/3/library/tarfile.html#tarfile-extraction-filter  for more information. Only Python versions 3.12 or later are affected by these vulnerabilities, earlier versions don't include the extraction filter feature.\n\nNote that for Python 3.14 or later the default value of filter= changed from \"no filtering\" to `\"data\", so if you are relying on this new default behavior then your usage is also affected.\n\nNote that none of these vulnerabilities significantly affect the installation of source distributions which are tar archives as source distributions already allow arbitrary code execution during the build process. However when evaluating source distributions it's important to avoid installing source distributions with suspicious links.",
1010
"affected": [
1111
{
1212
"ranges": [
@@ -99,4 +99,4 @@
9999
"database_specific": {
100100
"cwe_ids": []
101101
}
102-
}
102+
}

0 commit comments

Comments
 (0)