{
  "threat_severity" : "Important",
  "public_date" : "2025-06-03T12:59:02Z",
  "bugzilla" : {
    "description" : "cpython: python: Bypassing extraction filter to create symlinks to arbitrary targets outside extraction directory",
    "id" : "2372426",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=2372426"
  },
  "cvss3" : {
    "cvss3_base_score" : "7.5",
    "cvss3_scoring_vector" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
    "status" : "verified"
  },
  "cwe" : "CWE-22",
  "details" : [ "Allows the extraction filter to be ignored, allowing symlink targets to point outside the destination directory, and the modification of some file metadata.\nYou are affected by this vulnerability if using the tarfile module to extract untrusted tar archives using TarFile.extractall() or TarFile.extract() using the filter= parameter with a value of \"data\" or \"tar\". See the tarfile  extraction filters documentation https://docs.python.org/3/library/tarfile.html#tarfile-extraction-filter  for more information.\nNote that for Python 3.14 or later the default value of filter= changed from \"no filtering\" to `\"data\", so if you are relying on this new default behavior then your usage is also affected.\nNote that none of these vulnerabilities significantly affect the installation of source distributions which are tar archives as source distributions already allow arbitrary code execution during the build process. However when evaluating source distributions it's important to avoid installing source distributions with suspicious links.", "A flaw was found in the Python tarfile module. This vulnerability allows attackers to bypass extraction filters, enabling symlink targets to escape the destination directory and allowing unauthorized modification of file metadata via the use of TarFile.extract() or TarFile.extractall() with the filter= parameter set to \"data\" or \"tar\"." ],
  "statement" : "Versions of python36:3.6/python36 as shipped with Red Hat Enterprise Linux 8 are marked as 'Not affected' as they just provide \"symlinks\" to the main python3 component, which provides the actual interpreter of the Python programming language.",
  "affected_release" : [ {
    "product_name" : "Red Hat Enterprise Linux 10",
    "release_date" : "2025-07-01T00:00:00Z",
    "advisory" : "RHSA-2025:10140",
    "cpe" : "cpe:/o:redhat:enterprise_linux:10.0",
    "package" : "python3.12-0:3.12.9-2.el10_0.2"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8",
    "release_date" : "2025-07-01T00:00:00Z",
    "advisory" : "RHSA-2025:10026",
    "cpe" : "cpe:/a:redhat:enterprise_linux:8",
    "package" : "python3.11-0:3.11.13-1.el8_10"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8",
    "release_date" : "2025-07-01T00:00:00Z",
    "advisory" : "RHSA-2025:10031",
    "cpe" : "cpe:/a:redhat:enterprise_linux:8",
    "package" : "python3.12-0:3.12.11-1.el8_10"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8",
    "release_date" : "2025-07-01T00:00:00Z",
    "advisory" : "RHSA-2025:10128",
    "cpe" : "cpe:/a:redhat:enterprise_linux:8",
    "package" : "python3-0:3.6.8-70.el8_10"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8",
    "release_date" : "2025-12-18T00:00:00Z",
    "advisory" : "RHSA-2025:23530",
    "cpe" : "cpe:/a:redhat:enterprise_linux:8",
    "package" : "python39:3.9-8100020251126112422.d47b87a4"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8",
    "release_date" : "2025-12-18T00:00:00Z",
    "advisory" : "RHSA-2025:23530",
    "cpe" : "cpe:/a:redhat:enterprise_linux:8",
    "package" : "python39-devel:3.9-8100020251126112422.d47b87a4"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8",
    "release_date" : "2025-12-18T00:00:00Z",
    "advisory" : "RHSA-2025:23530",
    "cpe" : "cpe:/a:redhat:enterprise_linux:8::crb",
    "package" : "python39:3.9-8100020251126112422.d47b87a4"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8",
    "release_date" : "2025-12-18T00:00:00Z",
    "advisory" : "RHSA-2025:23530",
    "cpe" : "cpe:/a:redhat:enterprise_linux:8::crb",
    "package" : "python39-devel:3.9-8100020251126112422.d47b87a4"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8",
    "release_date" : "2025-07-01T00:00:00Z",
    "advisory" : "RHSA-2025:10128",
    "cpe" : "cpe:/o:redhat:enterprise_linux:8",
    "package" : "python3-0:3.6.8-70.el8_10"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support",
    "release_date" : "2025-07-07T00:00:00Z",
    "advisory" : "RHSA-2025:10484",
    "cpe" : "cpe:/a:redhat:rhel_aus:8.6",
    "package" : "python3-0:3.6.8-47.el8_6.8"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8.6 Extended Update Support Long-Life Add-On",
    "release_date" : "2025-07-07T00:00:00Z",
    "advisory" : "RHSA-2025:10484",
    "cpe" : "cpe:/a:redhat:rhel_eus_long_life:8.6",
    "package" : "python3-0:3.6.8-47.el8_6.8"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8.6 Telecommunications Update Service",
    "release_date" : "2025-07-07T00:00:00Z",
    "advisory" : "RHSA-2025:10484",
    "cpe" : "cpe:/a:redhat:rhel_tus:8.6",
    "package" : "python3-0:3.6.8-47.el8_6.8"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions",
    "release_date" : "2025-07-07T00:00:00Z",
    "advisory" : "RHSA-2025:10484",
    "cpe" : "cpe:/a:redhat:rhel_e4s:8.6",
    "package" : "python3-0:3.6.8-47.el8_6.8"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8.8 Extended Update Support Long-Life Add-On",
    "release_date" : "2025-07-08T00:00:00Z",
    "advisory" : "RHSA-2025:10602",
    "cpe" : "cpe:/a:redhat:rhel_eus_long_life:8.8",
    "package" : "python3-0:3.6.8-51.el8_8.10"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8.8 Telecommunications Update Service",
    "release_date" : "2025-07-08T00:00:00Z",
    "advisory" : "RHSA-2025:10602",
    "cpe" : "cpe:/a:redhat:rhel_tus:8.8",
    "package" : "python3-0:3.6.8-51.el8_8.10"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8.8 Update Services for SAP Solutions",
    "release_date" : "2025-07-08T00:00:00Z",
    "advisory" : "RHSA-2025:10602",
    "cpe" : "cpe:/a:redhat:rhel_e4s:8.8",
    "package" : "python3-0:3.6.8-51.el8_8.10"
  }, {
    "product_name" : "Red Hat Enterprise Linux 9",
    "release_date" : "2025-07-01T00:00:00Z",
    "advisory" : "RHSA-2025:10136",
    "cpe" : "cpe:/a:redhat:enterprise_linux:9",
    "package" : "python3.9-0:3.9.21-2.el9_6.1"
  }, {
    "product_name" : "Red Hat Enterprise Linux 9",
    "release_date" : "2025-07-01T00:00:00Z",
    "advisory" : "RHSA-2025:10148",
    "cpe" : "cpe:/a:redhat:enterprise_linux:9",
    "package" : "python3.11-0:3.11.11-2.el9_6.1"
  }, {
    "product_name" : "Red Hat Enterprise Linux 9",
    "release_date" : "2025-07-02T00:00:00Z",
    "advisory" : "RHSA-2025:10189",
    "cpe" : "cpe:/a:redhat:enterprise_linux:9",
    "package" : "python3.12-0:3.12.9-1.el9_6.1"
  }, {
    "product_name" : "Red Hat Enterprise Linux 9",
    "release_date" : "2025-07-01T00:00:00Z",
    "advisory" : "RHSA-2025:10136",
    "cpe" : "cpe:/o:redhat:enterprise_linux:9",
    "package" : "python3.9-0:3.9.21-2.el9_6.1"
  }, {
    "product_name" : "Red Hat Enterprise Linux 9.4 Extended Update Support",
    "release_date" : "2025-07-01T00:00:00Z",
    "advisory" : "RHSA-2025:10028",
    "cpe" : "cpe:/a:redhat:rhel_eus:9.4",
    "package" : "python3.12-0:3.12.1-4.el9_4.6"
  }, {
    "product_name" : "Red Hat Enterprise Linux 9.4 Extended Update Support",
    "release_date" : "2025-07-07T00:00:00Z",
    "advisory" : "RHSA-2025:10399",
    "cpe" : "cpe:/a:redhat:rhel_eus:9.4",
    "package" : "python3.9-0:3.9.18-3.el9_4.8"
  }, {
    "product_name" : "Red Hat Enterprise Linux 9.4 Extended Update Support",
    "release_date" : "2025-06-30T00:00:00Z",
    "advisory" : "RHSA-2025:9918",
    "cpe" : "cpe:/a:redhat:rhel_eus:9.4",
    "package" : "python3.11-0:3.11.7-1.el9_4.8"
  }, {
    "product_name" : "RHEL-8 based Middleware Containers",
    "release_date" : "2025-07-17T00:00:00Z",
    "advisory" : "RHSA-2025:11386",
    "cpe" : "cpe:/a:redhat:rhosemc:1.0::el8",
    "package" : "rhpam-7/rhpam-businesscentral-monitoring-rhel8:7.13.5-4.1752066672"
  }, {
    "product_name" : "RHEL-8 based Middleware Containers",
    "release_date" : "2025-07-17T00:00:00Z",
    "advisory" : "RHSA-2025:11386",
    "cpe" : "cpe:/a:redhat:rhosemc:1.0::el8",
    "package" : "rhpam-7/rhpam-businesscentral-rhel8:7.13.5-4.1752065732"
  }, {
    "product_name" : "RHEL-8 based Middleware Containers",
    "release_date" : "2025-07-17T00:00:00Z",
    "advisory" : "RHSA-2025:11386",
    "cpe" : "cpe:/a:redhat:rhosemc:1.0::el8",
    "package" : "rhpam-7/rhpam-controller-rhel8:7.13.5-4.1752065732"
  }, {
    "product_name" : "RHEL-8 based Middleware Containers",
    "release_date" : "2025-07-17T00:00:00Z",
    "advisory" : "RHSA-2025:11386",
    "cpe" : "cpe:/a:redhat:rhosemc:1.0::el8",
    "package" : "rhpam-7/rhpam-dashbuilder-rhel8:7.13.5-3.1752065737"
  }, {
    "product_name" : "RHEL-8 based Middleware Containers",
    "release_date" : "2025-07-17T00:00:00Z",
    "advisory" : "RHSA-2025:11386",
    "cpe" : "cpe:/a:redhat:rhosemc:1.0::el8",
    "package" : "rhpam-7/rhpam-kieserver-rhel8:7.13.5-4.1752065731"
  }, {
    "product_name" : "RHEL-8 based Middleware Containers",
    "release_date" : "2025-07-17T00:00:00Z",
    "advisory" : "RHSA-2025:11386",
    "cpe" : "cpe:/a:redhat:rhosemc:1.0::el8",
    "package" : "rhpam-7/rhpam-operator-bundle:7.13.5-25"
  }, {
    "product_name" : "RHEL-8 based Middleware Containers",
    "release_date" : "2025-07-17T00:00:00Z",
    "advisory" : "RHSA-2025:11386",
    "cpe" : "cpe:/a:redhat:rhosemc:1.0::el8",
    "package" : "rhpam-7/rhpam-process-migration-rhel8:7.13.5-4.1752065736"
  }, {
    "product_name" : "RHEL-8 based Middleware Containers",
    "release_date" : "2025-07-17T00:00:00Z",
    "advisory" : "RHSA-2025:11386",
    "cpe" : "cpe:/a:redhat:rhosemc:1.0::el8",
    "package" : "rhpam-7/rhpam-rhel8-operator:7.13.5-2.1752065733"
  }, {
    "product_name" : "RHEL-8 based Middleware Containers",
    "release_date" : "2025-07-17T00:00:00Z",
    "advisory" : "RHSA-2025:11386",
    "cpe" : "cpe:/a:redhat:rhosemc:1.0::el8",
    "package" : "rhpam-7/rhpam-smartrouter-rhel8:7.13.5-4.1752065755"
  }, {
    "product_name" : "RHOSS-1.36-RHEL-8",
    "release_date" : "2026-01-22T00:00:00Z",
    "advisory" : "RHSA-2026:0934",
    "cpe" : "cpe:/a:redhat:openshift_serverless:1.36::el8",
    "package" : "openshift-serverless-1/logic-data-index-ephemeral-rhel8:1.36.0-11"
  }, {
    "product_name" : "RHOSS-1.36-RHEL-8",
    "release_date" : "2026-01-22T00:00:00Z",
    "advisory" : "RHSA-2026:0934",
    "cpe" : "cpe:/a:redhat:openshift_serverless:1.36::el8",
    "package" : "openshift-serverless-1/logic-data-index-postgresql-rhel8:1.36.0-11"
  }, {
    "product_name" : "RHOSS-1.36-RHEL-8",
    "release_date" : "2026-01-22T00:00:00Z",
    "advisory" : "RHSA-2026:0934",
    "cpe" : "cpe:/a:redhat:openshift_serverless:1.36::el8",
    "package" : "openshift-serverless-1/logic-db-migrator-tool-rhel8:1.36.0-11"
  }, {
    "product_name" : "RHOSS-1.36-RHEL-8",
    "release_date" : "2026-01-22T00:00:00Z",
    "advisory" : "RHSA-2026:0934",
    "cpe" : "cpe:/a:redhat:openshift_serverless:1.36::el8",
    "package" : "openshift-serverless-1/logic-jobs-service-ephemeral-rhel8:1.36.0-10"
  }, {
    "product_name" : "RHOSS-1.36-RHEL-8",
    "release_date" : "2026-01-22T00:00:00Z",
    "advisory" : "RHSA-2026:0934",
    "cpe" : "cpe:/a:redhat:openshift_serverless:1.36::el8",
    "package" : "openshift-serverless-1/logic-jobs-service-postgresql-rhel8:1.36.0-10"
  }, {
    "product_name" : "RHOSS-1.36-RHEL-8",
    "release_date" : "2026-01-22T00:00:00Z",
    "advisory" : "RHSA-2026:0934",
    "cpe" : "cpe:/a:redhat:openshift_serverless:1.36::el8",
    "package" : "openshift-serverless-1/logic-kn-workflow-cli-artifacts-rhel8:1.36.0-4"
  }, {
    "product_name" : "RHOSS-1.36-RHEL-8",
    "release_date" : "2026-01-22T00:00:00Z",
    "advisory" : "RHSA-2026:0934",
    "cpe" : "cpe:/a:redhat:openshift_serverless:1.36::el8",
    "package" : "openshift-serverless-1/logic-management-console-rhel8:1.36.0-9"
  }, {
    "product_name" : "RHOSS-1.36-RHEL-8",
    "release_date" : "2026-01-22T00:00:00Z",
    "advisory" : "RHSA-2026:0934",
    "cpe" : "cpe:/a:redhat:openshift_serverless:1.36::el8",
    "package" : "openshift-serverless-1/logic-operator-bundle:1.36.0-12"
  }, {
    "product_name" : "RHOSS-1.36-RHEL-8",
    "release_date" : "2026-01-22T00:00:00Z",
    "advisory" : "RHSA-2026:0934",
    "cpe" : "cpe:/a:redhat:openshift_serverless:1.36::el8",
    "package" : "openshift-serverless-1/logic-rhel8-operator:1.36.0-18"
  }, {
    "product_name" : "RHOSS-1.36-RHEL-8",
    "release_date" : "2026-01-22T00:00:00Z",
    "advisory" : "RHSA-2026:0934",
    "cpe" : "cpe:/a:redhat:openshift_serverless:1.36::el8",
    "package" : "openshift-serverless-1/logic-swf-builder-rhel8:1.36.0-11"
  }, {
    "product_name" : "RHOSS-1.36-RHEL-8",
    "release_date" : "2026-01-22T00:00:00Z",
    "advisory" : "RHSA-2026:0934",
    "cpe" : "cpe:/a:redhat:openshift_serverless:1.36::el8",
    "package" : "openshift-serverless-1/logic-swf-devmode-rhel8:1.36.0-7"
  }, {
    "product_name" : "cert-manager operator for Red Hat OpenShift 1.16",
    "release_date" : "2025-10-16T00:00:00Z",
    "advisory" : "RHSA-2025:18219",
    "cpe" : "cpe:/a:redhat:cert_manager:1.16::el9",
    "package" : "cert-manager/jetstack-cert-manager-rhel9:sha256:1abdfac084e7c86e7a93a19e5cf6b54db79b903bfb7474a42200f753b29eda4b"
  }, {
    "product_name" : "Red Hat Discovery 2",
    "release_date" : "2025-08-06T00:00:00Z",
    "advisory" : "RHSA-2025:13267",
    "cpe" : "cpe:/a:redhat:discovery:2::el9",
    "package" : "discovery/discovery-server-rhel9:sha256:ad07f55ee75fb20310c88f154a04665bd8465d138d66c665c300f61447858344"
  } ],
  "package_state" : [ {
    "product_name" : "Red Hat Enterprise Linux 8",
    "fix_state" : "Not affected",
    "package_name" : "python36:3.6/python36",
    "cpe" : "cpe:/o:redhat:enterprise_linux:8"
  }, {
    "product_name" : "Red Hat OpenShift Container Platform 4",
    "fix_state" : "Not affected",
    "package_name" : "rhcos",
    "cpe" : "cpe:/a:redhat:openshift:4"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2025-4138\nhttps://nvd.nist.gov/vuln/detail/CVE-2025-4138\nhttps://gist.github.com/sethmlarson/52398e33eff261329a0180ac1d54f42f\nhttps://github.com/python/cpython/commit/3612d8f51741b11f36f8fb0494d79086bac9390a\nhttps://github.com/python/cpython/commit/9e0ac76d96cf80b49055f6d6b9a6763fb9215c2a\nhttps://github.com/python/cpython/issues/135034\nhttps://github.com/python/cpython/pull/135037\nhttps://mail.python.org/archives/list/security-announce@python.org/thread/MAXIJJCUUMCL7ATZNDVEGGHUMQMUUKLG/" ],
  "name" : "CVE-2025-4138",
  "mitigation" : {
    "value" : "Red Hat recommends upgrading to a fixed release of Python as soon as one is available. This vulnerability can be mitigated by rejecting links inside tarfiles that use relative references to the parent directory. The upstream advisory provides this example code:\n'''\n# Avoid insecure segments in link names.\nfor member in tar.getmembers():\nif not member.islnk():\ncontinue\nif os.pardir in os.path.split(member.linkname):\nraise OSError(\"Tarfile with insecure segment ('..') in linkname\")\n# Now safe to extract members with the data filter.\ntar.extractall(filter=\"data\")\n'''",
    "lang" : "en:us"
  },
  "csaw" : false
}