Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:deb/debian/python3.9@3.9.2-1%2Bdeb11u4?distro=bullseye
purl pkg:deb/debian/python3.9@3.9.2-1%2Bdeb11u4?distro=bullseye
Vulnerabilities affecting this package (0)
Vulnerability Summary Fixed by
This package is not known to be affected by vulnerabilities.
Vulnerabilities fixed by this package (8)
Vulnerability Summary Aliases
VCID-1uk5-6yqb-dyb5 cpython: Out-of-memory when loading Plist CVE-2025-13837
VCID-5maz-1h1k-3qfj Multiple vulberabilities have been discovered in Python and PyPy, the worst of which can lead to privilege escalation. CVE-2025-4516
VCID-8dtv-379a-wqfs cpython: Excessive read buffering DoS in http.client CVE-2025-13836
VCID-emaw-jmek-9bcy cpython: Python HTMLParser quadratic complexity CVE-2025-6069
VCID-ewbq-2gm8-tyf5 Buffer overflow in sponge queue functions ### Impact The Keccak sponge function interface accepts partial inputs to be absorbed and partial outputs to be squeezed. A buffer can overflow when partial data with some specific sizes are queued, where at least one of them has a length of 2^32 - 200 bytes or more. ### Patches Yes, see commit [fdc6fef0](https://github.com/XKCP/XKCP/commit/fdc6fef075f4e81d6b1bc38364248975e08e340a). ### Workarounds The problem can be avoided by limiting the size of the partial input data (or partial output digest) below 2^32 - 200 bytes. Multiple calls to the queue system can be chained at a higher level to retain the original functionality. Alternatively, one can process the entire input (or produce the entire output) at once, avoiding the queuing functions altogether. ### References See [issue #105](https://github.com/XKCP/XKCP/issues/105) for more details. CVE-2022-37454
GHSA-6w4m-2xhg-2658
VCID-fcsb-dn49-47gy python: Quadratic complexity in os.path.expandvars() with user-controlled template CVE-2025-6075
VCID-mtk7-qut6-syd8 cpython: Cpython infinite loop when parsing a tarfile CVE-2025-8194
VCID-znkr-fxtj-4uc7 cpython: python: Python zipfile End of Central Directory (EOCD) Locator record offset not checked CVE-2025-8291

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-16T12:53:17.508861+00:00 Debian Importer Fixing VCID-8dtv-379a-wqfs https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:57:39.828129+00:00 Debian Importer Fixing VCID-ewbq-2gm8-tyf5 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:40:56.264880+00:00 Debian Importer Fixing VCID-fcsb-dn49-47gy https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:31:54.457461+00:00 Debian Importer Fixing VCID-emaw-jmek-9bcy https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:44:43.614528+00:00 Debian Importer Fixing VCID-1uk5-6yqb-dyb5 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:27:21.753511+00:00 Debian Importer Fixing VCID-znkr-fxtj-4uc7 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:23:00.578725+00:00 Debian Importer Fixing VCID-5maz-1h1k-3qfj https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:47:07.529942+00:00 Debian Importer Fixing VCID-mtk7-qut6-syd8 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-13T08:50:53.309990+00:00 Debian Importer Fixing VCID-8dtv-379a-wqfs https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:09:56.037933+00:00 Debian Importer Fixing VCID-ewbq-2gm8-tyf5 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:57:34.389617+00:00 Debian Importer Fixing VCID-fcsb-dn49-47gy https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:51:36.058812+00:00 Debian Importer Fixing VCID-emaw-jmek-9bcy https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:15:59.775266+00:00 Debian Importer Fixing VCID-1uk5-6yqb-dyb5 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:18:29.014028+00:00 Debian Importer Fixing VCID-znkr-fxtj-4uc7 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:15:55.204056+00:00 Debian Importer Fixing VCID-5maz-1h1k-3qfj https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:54:04.811446+00:00 Debian Importer Fixing VCID-mtk7-qut6-syd8 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-03T07:51:02.951642+00:00 Debian Importer Fixing VCID-znkr-fxtj-4uc7 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:51:02.931003+00:00 Debian Importer Fixing VCID-mtk7-qut6-syd8 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:51:02.901454+00:00 Debian Importer Fixing VCID-fcsb-dn49-47gy https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:51:02.880937+00:00 Debian Importer Fixing VCID-emaw-jmek-9bcy https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:51:02.840066+00:00 Debian Importer Fixing VCID-5maz-1h1k-3qfj https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:51:02.676911+00:00 Debian Importer Fixing VCID-1uk5-6yqb-dyb5 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:51:02.656561+00:00 Debian Importer Fixing VCID-8dtv-379a-wqfs https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:51:01.973379+00:00 Debian Importer Fixing VCID-ewbq-2gm8-tyf5 https://security-tracker.debian.org/tracker/data/json 38.1.0