python3.11-devel vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the python3.11-devel package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • M
Improper Handling of Length Parameter Inconsistency

*
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:3.11.7-1.el9_4.9
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:3.11.7-1.el9_4.9
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:3.11.7-1.el9_4.9
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:3.11.2-2.el9_2.7
  • L
Expected Behavior Violation

<0:3.11.7-1.el9_4.3
  • L
Expected Behavior Violation

<0:3.11.7-1.el9_4.3
  • M
Improper Input Validation

<0:3.11.11-2.el9
  • M
Improper Input Validation

<0:3.11.11-2.el9
  • M
Improper Input Validation

<0:3.11.11-2.el9
  • M
Improper Input Validation

<0:3.11.11-2.el9
  • M
Inefficient Regular Expression Complexity

<0:3.11.9-7.el9_5.1
  • M
CVE-2024-6923

<0:3.11.7-1.el9_4.5
  • M
Inefficient Regular Expression Complexity

<0:3.11.7-1.el9_4.6
  • M
CVE-2024-6923

<0:3.11.7-1.el9_4.5
  • M
CVE-2024-6923

<0:3.11.7-1.el9_4.5
  • M
Inefficient Regular Expression Complexity

<0:3.11.9-7.el9_5.1
  • H
Symlink Following

<0:3.11.7-1.el9_4.1
  • H
Symlink Following

<0:3.11.7-1.el9_4.1
  • H
Symlink Following

<0:3.11.7-1.el9_4.1
  • M
Inefficient Regular Expression Complexity

<0:3.11.9-7.el9_5.1
  • H
Symlink Following

<0:3.11.7-1.el9_4.1
  • M
CVE-2024-6923

<0:3.11.7-1.el9_4.5
  • M
Improper Input Validation

<0:3.11.7-1.el9
  • M
Improper Input Validation

<0:3.11.7-1.el9
  • M
Unquoted Search Path or Element

<0:3.11.9-7.el9_5.2
  • M
Unquoted Search Path or Element

<0:3.11.9-7.el9_5.2
  • M
Improper Input Validation

<0:3.11.7-1.el9
  • M
Improper Input Validation

<0:3.11.7-1.el9
  • M
Unquoted Search Path or Element

<0:3.11.9-7.el9_5.2
  • M
Unquoted Search Path or Element

<0:3.11.9-7.el9_5.2
  • M
Improper Neutralization of Null Byte or NUL Character

<0:3.11.5-1.el9_3
  • M
Directory Traversal

<0:3.11.5-1.el9_3
  • M
Improper Neutralization of Null Byte or NUL Character

<0:3.11.5-1.el9_3
  • M
Directory Traversal

<0:3.11.5-1.el9_3
  • M
Improper Neutralization of Null Byte or NUL Character

<0:3.11.5-1.el9_3
  • M
Directory Traversal

<0:3.11.5-1.el9_3
  • M
Improper Neutralization of Null Byte or NUL Character

<0:3.11.5-1.el9_3
  • M
Directory Traversal

<0:3.11.5-1.el9_3
  • H
Authentication Bypass by Primary Weakness

<0:3.11.2-2.el9_2.2
  • H
Authentication Bypass by Primary Weakness

<0:3.11.2-2.el9_2.2
  • H
Authentication Bypass by Primary Weakness

<0:3.11.2-2.el9_2.2
  • H
Authentication Bypass by Primary Weakness

<0:3.11.2-2.el9_2.2
  • H
Improper Input Validation

<0:3.11.2-2.el9_2.1
  • H
Improper Input Validation

<0:3.11.2-2.el9_2.1
  • H
Improper Input Validation

<0:3.11.2-2.el9_2.1
  • H
Improper Input Validation

<0:3.11.2-2.el9_2.1
  • H
Directory Traversal

<0:3.11.11-2.el9_6.1
  • H
Use of Incorrectly-Resolved Name or Reference

<0:3.11.11-2.el9_6.1
  • H
Directory Traversal

<0:3.11.11-2.el9_6.1
  • H
Directory Traversal

<0:3.11.11-2.el9_6.1
  • H
Directory Traversal

<0:3.11.11-2.el9_6.1
  • H
Directory Traversal

<0:3.11.11-2.el9_6.1
  • H
Use of Incorrectly-Resolved Name or Reference

<0:3.11.11-2.el9_6.1
  • H
Directory Traversal

<0:3.11.11-2.el9_6.1
  • H
Directory Traversal

<0:3.11.11-2.el9_6.1
  • H
Directory Traversal

<0:3.11.11-2.el9_6.1
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:3.11.11-2.el9_6.2
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:3.11.11-2.el9_6.2
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:3.11.11-2.el9_6.2
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:3.11.11-2.el9_6.2
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:3.11.11-2.el9_6.2
  • L
Resource Exhaustion

<0:3.11.9-7.el9_5.3
  • L
Resource Exhaustion

<0:3.11.9-7.el9_5.3
  • L
Resource Exhaustion

<0:3.11.9-7.el9_5.3
  • L
Resource Exhaustion

<0:3.11.9-7.el9_5.3
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:3.11.9-7.el9
  • M
Multiple Interpretations of UI Input

<0:3.11.9-7.el9
  • M
Race Condition

<0:3.11.9-7.el9
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:3.11.9-7.el9
  • M
Multiple Interpretations of UI Input

<0:3.11.9-7.el9
  • M
Race Condition

<0:3.11.9-7.el9
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:3.11.9-7.el9
  • M
Multiple Interpretations of UI Input

<0:3.11.9-7.el9
  • M
Race Condition

<0:3.11.9-7.el9
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:3.11.9-7.el9
  • M
Multiple Interpretations of UI Input

<0:3.11.9-7.el9
  • M
Race Condition

<0:3.11.9-7.el9
  • L
Expected Behavior Violation

<0:3.11.7-1.el9_4.3
  • H
Directory Traversal

<0:3.11.11-2.el9_6.1
  • H
Use of Incorrectly-Resolved Name or Reference

<0:3.11.11-2.el9_6.1
  • H
Directory Traversal

<0:3.11.11-2.el9_6.1
  • H
Directory Traversal

<0:3.11.11-2.el9_6.1
  • H
Directory Traversal

<0:3.11.11-2.el9_6.1
  • L
Expected Behavior Violation

<0:3.11.7-1.el9_4.3
  • H
Directory Traversal

<0:3.11.11-2.el9_6.1
  • H
Use of Incorrectly-Resolved Name or Reference

<0:3.11.11-2.el9_6.1
  • H
Directory Traversal

<0:3.11.11-2.el9_6.1
  • H
Directory Traversal

<0:3.11.11-2.el9_6.1
  • H
Directory Traversal

<0:3.11.11-2.el9_6.1
  • M
Improper Neutralization of Null Byte or NUL Character

<0:3.11.5-1.el9_3
  • M
Directory Traversal

<0:3.11.5-1.el9_3
  • M
Improper Neutralization of Null Byte or NUL Character

<0:3.11.5-1.el9_3
  • M
Directory Traversal

<0:3.11.5-1.el9_3
  • H
Authentication Bypass by Primary Weakness

<0:3.11.2-2.el9_2.2
  • M
Improper Neutralization of Null Byte or NUL Character

<0:3.11.5-1.el9_3
  • M
Directory Traversal

<0:3.11.5-1.el9_3
  • H
Authentication Bypass by Primary Weakness

<0:3.11.2-2.el9_2.2
  • H
Authentication Bypass by Primary Weakness

<0:3.11.2-2.el9_2.2
  • H
Improper Input Validation

<0:3.11.2-2.el9_2.1
  • H
Improper Input Validation

<0:3.11.2-2.el9_2.1
  • H
Improper Input Validation

<0:3.11.2-2.el9_2.1
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:3.11.11-2.el9_6.2
  • M
Use After Free

*
  • H
Directory Traversal

<0:3.11.11-2.el9_6.1
  • H
Use of Incorrectly-Resolved Name or Reference

<0:3.11.11-2.el9_6.1
  • H
Directory Traversal

<0:3.11.11-2.el9_6.1
  • H
Directory Traversal

<0:3.11.11-2.el9_6.1
  • H
Directory Traversal

<0:3.11.11-2.el9_6.1
  • H
Directory Traversal

<0:3.11.7-1.el9_4.8
  • H
Use of Incorrectly-Resolved Name or Reference

<0:3.11.7-1.el9_4.8
  • H
Directory Traversal

<0:3.11.7-1.el9_4.8
  • H
Directory Traversal

<0:3.11.7-1.el9_4.8
  • H
Directory Traversal

<0:3.11.7-1.el9_4.8
  • H
Directory Traversal

<0:3.11.7-1.el9_4.8
  • H
Use of Incorrectly-Resolved Name or Reference

<0:3.11.7-1.el9_4.8
  • H
Directory Traversal

<0:3.11.7-1.el9_4.8
  • H
Directory Traversal

<0:3.11.7-1.el9_4.8
  • H
Directory Traversal

<0:3.11.7-1.el9_4.8
  • H
Directory Traversal

<0:3.11.7-1.el9_4.8
  • H
Use of Incorrectly-Resolved Name or Reference

<0:3.11.7-1.el9_4.8
  • H
Directory Traversal

<0:3.11.7-1.el9_4.8
  • H
Directory Traversal

<0:3.11.7-1.el9_4.8
  • H
Directory Traversal

<0:3.11.7-1.el9_4.8
  • H
Directory Traversal

<0:3.11.11-2.el9_6.1
  • H
Directory Traversal

<0:3.11.11-2.el9_6.1
  • H
Use of Incorrectly-Resolved Name or Reference

<0:3.11.11-2.el9_6.1
  • H
Directory Traversal

<0:3.11.11-2.el9_6.1
  • H
Directory Traversal

<0:3.11.11-2.el9_6.1
  • M
Inefficient Regular Expression Complexity

*
  • M
Race Condition

<0:3.11.9-7.el9
  • M
Inefficient Regular Expression Complexity

<0:3.11.7-1.el9_4.6
  • M
Inefficient Regular Expression Complexity

<0:3.11.7-1.el9_4.6
  • M
Inefficient Regular Expression Complexity

<0:3.11.9-7.el9_5.1
  • L
Expected Behavior Violation

<0:3.11.7-1.el9_4.3
  • L
Expected Behavior Violation

<0:3.11.7-1.el9_4.3
  • L
Expected Behavior Violation

<0:3.11.7-1.el9_4.3
  • M
Improper Input Validation

<0:3.11.11-2.el9
  • M
Unquoted Search Path or Element

<0:3.11.7-1.el9_4.7
  • M
Unquoted Search Path or Element

<0:3.11.7-1.el9_4.7
  • M
Unquoted Search Path or Element

<0:3.11.9-7.el9_5.2
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:3.11.9-7.el9
  • M
Multiple Interpretations of UI Input

<0:3.11.9-7.el9
  • L
Resource Exhaustion

<0:3.11.9-7.el9_5.3
  • H
Symlink Following

<0:3.11.7-1.el9_4.1
  • H
Symlink Following

<0:3.11.7-1.el9_4.1
  • H
Symlink Following

<0:3.11.7-1.el9_4.1
  • M
Improper Input Validation

<0:3.11.7-1.el9
  • M
Improper Input Validation

<0:3.11.7-1.el9
  • M
Improper Input Validation

<0:3.11.7-1.el9
  • M
CVE-2024-6923

<0:3.11.7-1.el9_4.5
  • M
CVE-2024-6923

<0:3.11.7-1.el9_4.5
  • M
CVE-2024-6923

<0:3.11.7-1.el9_4.5
  • L
Improper Handling of Inconsistent Special Elements

*
  • M
Improper Input Validation

<0:3.11.11-2.el9
  • M
Unquoted Search Path or Element

<0:3.11.7-1.el9_4.7
  • M
Unquoted Search Path or Element

<0:3.11.9-7.el9_5.2
  • M
Inefficient Regular Expression Complexity

<0:3.11.7-1.el9_4.6
  • M
CVE-2024-6923

<0:3.11.2-2.el9_2.6
  • M
Inefficient Regular Expression Complexity

<0:3.11.2-2.el9_2.6
  • M
CVE-2024-6923

<0:3.11.2-2.el9_2.6
  • M
Inefficient Regular Expression Complexity

<0:3.11.2-2.el9_2.6
  • M
CVE-2024-6923

<0:3.11.2-2.el9_2.6
  • M
Inefficient Regular Expression Complexity

<0:3.11.2-2.el9_2.6
  • L
Resource Exhaustion

<0:3.11.9-7.el9_5.3
  • M
Inefficient Regular Expression Complexity

<0:3.11.7-1.el9_4.6
  • M
CVE-2024-6923

<0:3.11.7-1.el9_4.5
  • M
Improper Input Validation

<0:3.11.7-1.el9
  • H
Symlink Following

<0:3.11.7-1.el9_4.1
  • M
Improper Neutralization of Null Byte or NUL Character

<0:3.11.5-1.el9_3
  • M
Directory Traversal

<0:3.11.5-1.el9_3
  • H
Authentication Bypass by Primary Weakness

<0:3.11.2-2.el9_2.2
  • H
Improper Input Validation

<0:3.11.2-2.el9_2.1
  • L
Expected Behavior Violation

<0:3.11.7-1.el9_4.3
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:3.11.9-7.el9
  • M
CVE-2024-6923

<0:3.11.7-1.el9_4.5
  • M
Race Condition

<0:3.11.9-7.el9
  • H
Symlink Following

<0:3.11.2-2.el9_2.4
  • H
Symlink Following

<0:3.11.2-2.el9_2.4
  • H
Symlink Following

<0:3.11.2-2.el9_2.4
  • L
Expected Behavior Violation

<0:3.11.7-1.el9_4.3
  • M
Multiple Interpretations of UI Input

<0:3.11.9-7.el9
  • H
Symlink Following

<0:3.11.7-1.el9_4.1
  • M
Improper Neutralization of Null Byte or NUL Character

<0:3.11.5-1.el9_3
  • H
Authentication Bypass by Primary Weakness

<0:3.11.2-2.el9_2.2
  • H
Authentication Bypass by Primary Weakness

<0:3.11.2-2.el9_2.2
  • H
Authentication Bypass by Primary Weakness

<0:3.11.2-2.el9_2.2
  • H
Authentication Bypass by Primary Weakness

<0:3.11.2-2.el9_2.2
  • M
Uncontrolled Recursion

*
  • M
Improper Input Validation

<0:3.11.7-1.el9
  • H
Improper Input Validation

<0:3.11.2-2.el9_2.1
  • H
Improper Input Validation

<0:3.11.2-2.el9_2.1
  • H
Improper Input Validation

<0:3.11.2-2.el9_2.1
  • H
Improper Input Validation

<0:3.11.2-2.el9_2.1
  • M
Directory Traversal

<0:3.11.5-1.el9_3