| Risk | High |
| Patch available | YES |
| Number of vulnerabilities | 2 |
| CVE-ID | CVE-2025-47273 CVE-2025-8194 |
| CWE-ID | CWE-22 CWE-835 |
| Exploitation vector | Network |
| Public exploit | N/A |
| Vulnerable software |
Anolis OS Operating systems & Components / Operating system python39-setuptools-wheel Operating systems & Components / Operating system package or component python39-setuptools Operating systems & Components / Operating system package or component python39-rpm-macros Operating systems & Components / Operating system package or component python39-tkinter Operating systems & Components / Operating system package or component python39-test Operating systems & Components / Operating system package or component python39-libs Operating systems & Components / Operating system package or component python39-idle Operating systems & Components / Operating system package or component python39-devel Operating systems & Components / Operating system package or component python39-debug Operating systems & Components / Operating system package or component python39 Operating systems & Components / Operating system package or component python39-pip-wheel Operating systems & Components / Operating system package or component python39-pip Operating systems & Components / Operating system package or component python39-idna Operating systems & Components / Operating system package or component python39-psycopg2-tests Operating systems & Components / Operating system package or component python39-psycopg2-doc Operating systems & Components / Operating system package or component python39-psycopg2 Operating systems & Components / Operating system package or component python39-cryptography Operating systems & Components / Operating system package or component python39-urllib3 Operating systems & Components / Operating system package or component python39-requests Operating systems & Components / Operating system package or component python39-pytest Operating systems & Components / Operating system package or component python39-scipy Operating systems & Components / Operating system package or component python39-mod_wsgi Operating systems & Components / Operating system package or component python39-numpy-doc Operating systems & Components / Operating system package or component python39-numpy-f2py Operating systems & Components / Operating system package or component python39-numpy Operating systems & Components / Operating system package or component python39-wheel-wheel Operating systems & Components / Operating system package or component python39-wheel Operating systems & Components / Operating system package or component python39-wcwidth Operating systems & Components / Operating system package or component python39-toml Operating systems & Components / Operating system package or component python39-six Operating systems & Components / Operating system package or component python39-pysocks Operating systems & Components / Operating system package or component python39-pyparsing Operating systems & Components / Operating system package or component python39-pycparser Operating systems & Components / Operating system package or component python39-py Operating systems & Components / Operating system package or component python39-ply Operating systems & Components / Operating system package or component python39-pluggy Operating systems & Components / Operating system package or component python39-packaging Operating systems & Components / Operating system package or component python39-more-itertools Operating systems & Components / Operating system package or component python39-iniconfig Operating systems & Components / Operating system package or component python39-chardet Operating systems & Components / Operating system package or component python39-attrs Operating systems & Components / Operating system package or component python39-PyMySQL Operating systems & Components / Operating system package or component python39-pyyaml Operating systems & Components / Operating system package or component python39-pybind11-devel Operating systems & Components / Operating system package or component python39-pybind11 Operating systems & Components / Operating system package or component python39-psutil Operating systems & Components / Operating system package or component python39-lxml Operating systems & Components / Operating system package or component python39-cffi Operating systems & Components / Operating system package or component python39-Cython Operating systems & Components / Operating system package or component |
| Vendor | OpenAnolis |
Security Bulletin
This security bulletin contains information about 2 vulnerabilities.
EUVDB-ID: #VU109840
Risk: High
CVSSv4.0: 6.1 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]
CVE-ID: CVE-2025-47273
CWE-ID:
CWE-22 - Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to compromise the affected system.
The vulnerability exists due to input validation error when processing directory traversal sequences in package_index.py. A remote attacker can trick the victim into installing a specially crafted script and overwrite arbitrary files on the system, leading to code execution.
Install updates from vendor's repository.
Vulnerable software versionsAnolis OS: 8
python39-setuptools-wheel: before 50.3.2-7
python39-setuptools: before 50.3.2-7
python39-rpm-macros: before 3.9.20-2.0.1
python39-tkinter: before 3.9.20-2.0.1
python39-test: before 3.9.20-2.0.1
python39-libs: before 3.9.20-2.0.1
python39-idle: before 3.9.20-2.0.1
python39-devel: before 3.9.20-2.0.1
python39-debug: before 3.9.20-2.0.1
python39: before 3.9.20-2.0.1
python39-pip-wheel: before 20.2.4-9
python39-pip: before 20.2.4-9
python39-idna: before 2.10-4
python39-psycopg2-tests: before 2.8.6-3.0.1
python39-psycopg2-doc: before 2.8.6-3.0.1
python39-psycopg2: before 2.8.6-3.0.1
python39-cryptography: before 3.3.1-3
python39-urllib3: before 1.25.10-5
python39-requests: before 2.25.0-3
python39-pytest: before 6.0.2-2.0.1
python39-scipy: before 1.5.4-5.0.1
python39-mod_wsgi: before 4.7.1-7
python39-numpy-doc: before 1.19.4-3.0.1
python39-numpy-f2py: before 1.19.4-3.0.1
python39-numpy: before 1.19.4-3.0.1
python39-wheel-wheel: before 0.35.1-4
python39-wheel: before 0.35.1-4
python39-wcwidth: before 0.2.5-3
python39-toml: before 0.10.1-5
python39-six: before 1.15.0-3
python39-pysocks: before 1.7.1-4
python39-pyparsing: before 2.4.7-5
python39-pycparser: before 2.20-3
python39-py: before 1.10.0-1
python39-ply: before 3.11-10
python39-pluggy: before 0.13.1-3
python39-packaging: before 20.4-4
python39-more-itertools: before 8.5.0-2
python39-iniconfig: before 1.1.1-2
python39-chardet: before 3.0.4-19
python39-attrs: before 20.3.0-2
python39-PyMySQL: before 0.10.1-2
python39-pyyaml: before 5.4.1-1
python39-pybind11-devel: before 2.7.1-1
python39-pybind11: before 2.7.1-1
python39-psutil: before 5.8.0-4.0.1
python39-lxml: before 4.6.5-1
python39-cffi: before 1.14.3-2
python39-Cython: before 0.29.21-5
CPE2.3https://anas.openanolis.cn/errata/detail/ANSA-2025:0618
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU113738
Risk: Medium
CVSSv4.0: 1.2 [CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2025-8194
CWE-ID:
CWE-835 - Loop with Unreachable Exit Condition ('Infinite Loop')
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to infinite loop in the “tarfile” module when handling tar archives with negative offsets. A remote attacker can pass a specially crafted tar archive to the application and consume all available system resources, resulting in a deadlock and a denial of service.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsAnolis OS: 8
python39-setuptools-wheel: before 50.3.2-7
python39-setuptools: before 50.3.2-7
python39-rpm-macros: before 3.9.20-2.0.1
python39-tkinter: before 3.9.20-2.0.1
python39-test: before 3.9.20-2.0.1
python39-libs: before 3.9.20-2.0.1
python39-idle: before 3.9.20-2.0.1
python39-devel: before 3.9.20-2.0.1
python39-debug: before 3.9.20-2.0.1
python39: before 3.9.20-2.0.1
python39-pip-wheel: before 20.2.4-9
python39-pip: before 20.2.4-9
python39-idna: before 2.10-4
python39-psycopg2-tests: before 2.8.6-3.0.1
python39-psycopg2-doc: before 2.8.6-3.0.1
python39-psycopg2: before 2.8.6-3.0.1
python39-cryptography: before 3.3.1-3
python39-urllib3: before 1.25.10-5
python39-requests: before 2.25.0-3
python39-pytest: before 6.0.2-2.0.1
python39-scipy: before 1.5.4-5.0.1
python39-mod_wsgi: before 4.7.1-7
python39-numpy-doc: before 1.19.4-3.0.1
python39-numpy-f2py: before 1.19.4-3.0.1
python39-numpy: before 1.19.4-3.0.1
python39-wheel-wheel: before 0.35.1-4
python39-wheel: before 0.35.1-4
python39-wcwidth: before 0.2.5-3
python39-toml: before 0.10.1-5
python39-six: before 1.15.0-3
python39-pysocks: before 1.7.1-4
python39-pyparsing: before 2.4.7-5
python39-pycparser: before 2.20-3
python39-py: before 1.10.0-1
python39-ply: before 3.11-10
python39-pluggy: before 0.13.1-3
python39-packaging: before 20.4-4
python39-more-itertools: before 8.5.0-2
python39-iniconfig: before 1.1.1-2
python39-chardet: before 3.0.4-19
python39-attrs: before 20.3.0-2
python39-PyMySQL: before 0.10.1-2
python39-pyyaml: before 5.4.1-1
python39-pybind11-devel: before 2.7.1-1
python39-pybind11: before 2.7.1-1
python39-psutil: before 5.8.0-4.0.1
python39-lxml: before 4.6.5-1
python39-cffi: before 1.14.3-2
python39-Cython: before 0.29.21-5
CPE2.3https://anas.openanolis.cn/errata/detail/ANSA-2025:0618
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.