python38-devel vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the python38-devel package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • M
CVE-2023-32681

<0:3.8.17-2.module+el8.9.0+90017+9913aa0c
  • M
Directory Traversal

<0:3.8.17-2.module+el8.9.0+90017+9913aa0c
  • H
Improper Input Validation

<0:3.8.16-1.module+el8.8.0+21120+5d2e4734.1
  • M
Algorithmic Complexity

<0:3.8.16-1.module+el8.8.0+21001+646f3fba
  • M
Open Redirect

<0:3.8.16-1.module+el8.8.0+21001+646f3fba
  • M
Incorrect Type Conversion or Cast

<0:3.8.16-1.module+el8.8.0+21001+646f3fba
  • M
Arbitrary Command Injection

<0:3.8.13-1.module+el8.7.0+20792+22659047
  • M
Arbitrary Code Injection

<0:3.8.12-1.module+el8.6.0+20556+9910889d
  • M
Arbitrary Code Injection

<0:3.8.12-1.module+el8.6.0+20556+9910889d
  • M
Double Free

<0:3.8.8-4.module+el8.5.0+20371+4f24d723
  • M
Directory Traversal

<0:3.8.8-4.module+el8.5.0+20371+4f24d723
  • M
CVE-2021-29921

<0:3.8.8-4.module+el8.5.0+20371+4f24d723
  • M
CVE-2021-3572

<0:3.8.8-4.module+el8.5.0+20371+4f24d723
  • M
Resource Exhaustion

<0:3.8.8-4.module+el8.5.0+20371+4f24d723
  • M
Resource Exhaustion

<0:3.8.12-1.module+el8.6.0+20556+9910889d
  • M
CVE-2021-20095

<0:3.8.8-4.module+el8.5.0+20371+4f24d723
  • M
Resource Exhaustion

<0:3.8.8-4.module+el8.5.0+20371+4f24d723
  • M
Cross-site Scripting (XSS)

<0:3.8.8-4.module+el8.5.0+20371+4f24d723
  • M
Directory Traversal

<0:3.8.8-4.module+el8.5.0+20371+4f24d723
  • M
Resource Exhaustion

<0:3.8.12-1.module+el8.6.0+20556+9910889d
  • M
Improper Input Validation

<0:3.8.6-3.module+el8.4.0+20068+32a535e2
  • M
HTTP Request Smuggling

<0:3.8.8-4.module+el8.5.0+20371+4f24d723
  • H
Buffer Overflow

<0:3.8.3-3.0.1.module+el8.3.0+el8+9681+09f2c1ca
  • M
Cross-site Scripting (XSS)

<0:3.8.6-3.module+el8.4.0+20068+32a535e2
  • M
Arbitrary Code Injection

<0:3.8.6-3.module+el8.4.0+20068+32a535e2
  • M
Improper Input Validation

<0:3.8.3-3.module+el8.3.0+7824+e0098946
  • M
Deserialization of Untrusted Data

<0:3.8.3-3.module+el8.3.0+7824+e0098946
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:3.8.3-3.module+el8.3.0+7824+e0098946
  • M
Use of Insufficiently Random Values

<0:3.8.3-3.module+el8.3.0+7824+e0098946
  • M
Resource Exhaustion

<0:3.8.3-3.module+el8.3.0+7824+e0098946