Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-16725 | When using a TarFile.errorlevel = 0 and extracting with a filter the documented behavior is that any filtered members would be skipped and not extracted. However the actual behavior of TarFile.errorlevel = 0 in affected versions is that the member would still be extracted and not skipped. |
Ubuntu USN |
USN-7583-1 | Python vulnerabilities |
Wed, 09 Jul 2025 02:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:/a:redhat:rhel_e4s:8.8 cpe:/a:redhat:rhel_eus_long_life:8.8 cpe:/a:redhat:rhel_tus:8.8 |
Tue, 08 Jul 2025 02:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Redhat rhel Aus
Redhat rhel E4s Redhat rhel Eus Long Life Redhat rhel Tus |
|
| CPEs | cpe:/a:redhat:rhel_aus:8.6 cpe:/a:redhat:rhel_e4s:8.6 cpe:/a:redhat:rhel_eus_long_life:8.6 cpe:/a:redhat:rhel_tus:8.6 |
|
| Vendors & Products |
Redhat rhel Aus
Redhat rhel E4s Redhat rhel Eus Long Life Redhat rhel Tus |
Wed, 02 Jul 2025 14:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:/a:redhat:enterprise_linux:9 cpe:/o:redhat:enterprise_linux:10.0 cpe:/o:redhat:enterprise_linux:8 cpe:/o:redhat:enterprise_linux:9 |
Wed, 02 Jul 2025 02:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Redhat enterprise Linux
|
|
| CPEs | cpe:/a:redhat:enterprise_linux:8 | |
| Vendors & Products |
Redhat enterprise Linux
|
Tue, 01 Jul 2025 02:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Redhat
Redhat rhel Eus |
|
| CPEs | cpe:/a:redhat:rhel_eus:9.4 | |
| Vendors & Products |
Redhat
Redhat rhel Eus |
Fri, 20 Jun 2025 06:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Fri, 06 Jun 2025 19:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-706 | |
| References |
| |
| Metrics |
threat_severity
|
threat_severity
|
Tue, 03 Jun 2025 21:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Tue, 03 Jun 2025 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Tue, 03 Jun 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-682 | |
| Metrics |
ssvc
|
Tue, 03 Jun 2025 15:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Tue, 03 Jun 2025 13:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Tue, 03 Jun 2025 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | When using a TarFile.errorlevel = 0 and extracting with a filter the documented behavior is that any filtered members would be skipped and not extracted. However the actual behavior of TarFile.errorlevel = 0 in affected versions is that the member would still be extracted and not skipped. | |
| Title | Tarfile extracts filtered members when errorlevel=0 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: PSF
Published:
Updated: 2026-04-21T20:16:34.166Z
Reserved: 2025-05-08T15:05:11.874Z
Link: CVE-2025-4435
Updated: 2025-06-03T14:34:29.201Z
Status : Deferred
Published: 2025-06-03T13:15:20.630
Modified: 2026-04-15T00:35:42.020
Link: CVE-2025-4435
OpenCVE Enrichment
Updated: 2026-04-22T12:15:16Z
EUVD
Ubuntu USN